Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Path: utzoo!mnetor!uunet!lll-winken!csustan!polyslo!caus-dp!marcos
From: marcos@caus-dp.UUCP (Marcos R. Della)
Newsgroups: comp.unix.wizards
Subject: Re: 60-second timeout in Unix login
Message-ID: <301@caus-dp.UUCP>
Date: Wed, 25-Nov-87 16:13:21 EST
Article-I.D.: caus-dp.301
Posted: Wed Nov 25 16:13:21 1987
Date-Received: Sun, 29-Nov-87 09:49:01 EST
References: <4139@venera.isi.edu> <2167@tut.cis.ohio-state.edu> <1878@bloom-beacon.MIT.EDU>
Organization: USPFO for CA - Data Processing Div., SLO, Ca
Lines: 16

In article <1878@bloom-beacon.MIT.EDU>, wolfgang@mgm.mit.edu (Wolfgang Rupprecht) writes:
> If you wanted to "play with" the hacker a bit, you could (say after 10
> to 20 bad login attempts), give them ish(l) as a login shell! Ish is a
> hack "shell" that was posted to the net 3-4 years ago....

If you could, can you post the source code to such a program or finger its
location where we can pester someone else for a copy? That would be
something that would help a security problem that we have going on here
at our  location...
 
Marcos Della
 
-- 
...!lll-crg -> !csustan -\                           | Whatever I said doesn't
            ...!sdsu ----->->!polyslo!caus-dp!marcos | mean diddly as I forgot
  ...!ihnp4 -> !csun ----/                           | it even before finishing
            ...!dmsd ---/                            | typing it all out!!!