Thinking back now, I had made the argument to my ISP that my code red defense was legit. Someone from the outside was attempting to break in to my system and grab a file with out my permission. I allowed them to access the file, itís not my fault the file broke there system . Basically I implemented a destructive honeypot.