\r\nYou know that's silly. Most boxes, for one reason or another, are insufficiently firewalled, patched, locked down, etc.\r\n
\r\n\r\nAn identified and exploited hole will do fine.\r\n
\r\n\r\nDoS attacks are extremely common:\r\n
\r\n\r\n[link|http://www.internetnews.com/bus-news/article.php/773341|internetnews.com article]\r\n
\r\n\r\n4,000 attacks a week. Sure, half only lasted 10 minutes or less, but that still means that there were 2,000 attacks of 10 minutes or more.\r\n
\r\n\r\nPeter's Rules Of The Internet:\r\n
\r\n- \r\n
- The remote root exploit you know about is less worrisome than the one you don't know about. \r\n
- You're not locked down enough to prevent a sufficiently determined and skilled intruder gaining entry to your system \r\n
- Once you get past the noddy stage of systems administration, the operating system of the host system is irrelevant. See (2). \r\n
- To resolve 2, you should take the computer, disconnect its network cable, place it (the computer) in a strong steel box, lock the box, place the box in a safe, lock the safe, affix a large sign that clearly says "CONTAINS LIVE TIGERS" to it, take the safe out to sea, drop it in the Marianas Trench, scuttle the boat, kill everyone involved and then yourself. \r\n
\r\nThe computer is now sufficiently secure to keep anyone out.\r\n