Systems and methods for denying access to a data processing system by an
intruder are provided. Input/output (I/O) on the intruder's connection
may be taken over and responses mimicking a local terminal session passed
back. On an attempted reconnect by the intruder, the user name and
password used by the intruder to access the system may be captured. The
password may then be changed on the edge system and the intruder's
terminal session disconnected, or alternatively, continue to log the
intruder's activity.