Ian Stokes-Rees <[log in to unmask]> writes:
> Publicly naming which machines and accounts at a site have been
> compromised
We *need* to know that. Other sites *must* be able to scan their logs
for suspect logins. The recent spate of intrusions has made that
abundantly clear.
> the name and phone number of the person who was likely to have had
> their account compromised
Care should be taken in disclosing that, of course.
--
Leif Nixon Systems expert
------------------------------------------------------------
National Supercomputer Centre Linkoping University
------------------------------------------------------------
|