6 2002 |
I'm glad I have a firewall in place - it's logs show far more "spurious" connection requests than I expected. I'm considering having a little fun with these wannabe hackers - I could set the firewall to direct all connections to a little isolated server, set up to lead hackers through a maze of webpages & fake login screens into a trap of logged break-in attempts, formatted & ready to forward to an ISP or law enforcement. Or, I could conserve my time and ignore them like everyone else. The jury's still out on that.
