Quote:
|
Originally Posted by danielf
Fair enough, though I'd call that a semi-legitimate use 
|
True..It was, however the only thing that comes near to being a legitimate use that I could think of.
I wouldn't normally do it anyway. The only reason I dd it in this case was that we knew the user was involved in hacking activity and he had been warned multiple times not to run port scans.
Normally, I just remove the user's access to the program.