Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP Path: utzoo!mnetor!uunet!lll-winken!csustan!polyslo!caus-dp!marcos From: marcos@caus-dp.UUCP (Marcos R. Della) Newsgroups: comp.unix.wizards Subject: Re: 60-second timeout in Unix login Message-ID: <301@caus-dp.UUCP> Date: Wed, 25-Nov-87 16:13:21 EST Article-I.D.: caus-dp.301 Posted: Wed Nov 25 16:13:21 1987 Date-Received: Sun, 29-Nov-87 09:49:01 EST References: <4139@venera.isi.edu> <2167@tut.cis.ohio-state.edu> <1878@bloom-beacon.MIT.EDU> Organization: USPFO for CA - Data Processing Div., SLO, Ca Lines: 16 In article <1878@bloom-beacon.MIT.EDU>, wolfgang@mgm.mit.edu (Wolfgang Rupprecht) writes: > If you wanted to "play with" the hacker a bit, you could (say after 10 > to 20 bad login attempts), give them ish(l) as a login shell! Ish is a > hack "shell" that was posted to the net 3-4 years ago.... If you could, can you post the source code to such a program or finger its location where we can pester someone else for a copy? That would be something that would help a security problem that we have going on here at our location... Marcos Della -- ...!lll-crg -> !csustan -\ | Whatever I said doesn't ...!sdsu ----->->!polyslo!caus-dp!marcos | mean diddly as I forgot ...!ihnp4 -> !csun ----/ | it even before finishing ...!dmsd ---/ | typing it all out!!!