Thursday, February 02, 2006

Malicious Malware: attacking the attackers, part 2

Malicious Malware: attacking the attackers, part 2:
This article explores measures to attack those malicious attackers who seek to harm our legitimate systems. The proactive use of exploits and bot networks that fight other bot networks, along with social engineering and attacker techniques are all discussed in an ethical manner. Part two of two.


I think this might be a bad idea. Taking a passive role, such as blocking a would be attacker might be a better idea. This all depends on the resources you have. If you have the resources then go for it.

Mozilla and hypocrisy

Right, but what about the experiences that Mozilla chooses to default for users like switching to  Yahoo and making that the default upon ...