Actually a better option might be to turn the exploited system into a honeypot to try to gain some information about the attackers, their methods and so on. -- bye, pabs http://wiki.debian.org/PaulWise