Findings:
- Attacker
- Detecting an attacker's IP address hidden by backscatter
- If an attacker has physical access, your system is already compromised
- Would-be
- Would-be King
- Would-be Jarhead (user)
If you Log in you could create a "would-be attackers" node. If you don't already have an account, you can register here.