Is Your e3000 Environment Secure? - by Mark Bixby

Is Your e3000 Environment Secure? - HPWorld 2003 page 34August 14, 2003
Don't get mad, get even!
§Report hacking attempts to the appropriate authorities
within your organization
§If the hacking originated via the Internet, use traceroute
to display the network topology all the way back to the
originating IP address to reveal:
– the originator's organization
– the originator's Internet Service Provider
§Visit www.radb.net to determine who owns the netblock
containing the IP address
§Complain about the hacking to the organization, the
ISP, and the netblock owner