Jim Lynch wrote: > What someone really needs to do is write a ssh spoofing daemon to accept > any user and any password and let them think they've logged in. If > there were enough out there, maybe it would keep the chaps busy sorting > the spoofs from reality. It's already been done, called a tar pit... -- Until later, Geoffrey