Very appropriate. Geoffrey wrote: > Jim Lynch wrote: > >> What someone really needs to do is write a ssh spoofing daemon to >> accept any user and any password and let them think they've logged >> in. If there were enough out there, maybe it would keep the chaps >> busy sorting the spoofs from reality. > > > It's already been done, called a tar pit... >