wireless access point
Matthew Carpenter
matt
Mon May 17 11:58:29 PDT 2004
Hi Alma-
I commend you on your giving nature and wish more people were so cool... but I still have a beef with what you are doing:
As someone responsible for network security for several companies, large and small, please understand that personal responsibility is extremely important for network resources. For instance... When there are hacking attempts, spam, or otherwise ill-favored traffic filling my firewall logs or email servers we must contact the people responsible for the IP Address of origin and apply pressure. That is the bigtime provider (AT&T, Sprint, etc...), the middle-guy (Comcast, RoadRunner, Iserv), and eventually... you. If we cannot track down wrongdoings and bad netizenship there is no correction of wrongs. Often, the customer loses their network, and I would have it no other way. When you cannot vouch for everyone using your network privileges, you will suffer. It is only a matter of time. Kiddie-Porn is only one way you can be affected. Active hacking or spreading of viruses, etc... That's likely to get corporate trouble.
On Wed, 21 Jan 2004 16:40:51 -0600
Alma J Wetzker <almaw at ieee.org> wrote:
> I read about that. It sounded like the defense was going to work. If I see
> that kind of material go by I will start to restrict what the wireless users
> can get to. So far, I just have a couple of neighbors, who I like, using the
> access.
>
> I know it is a bad habit. The *nix sysadmins all want to shut down access to
> anything not absolutely necessary to job function. I like to leave everything
> not absolutely required to be secure, available to users. I found that I got
> more productive users that way. (Please note: That does not mean critical
> files can be modified or anything stupid like that.)
More information about the Linux-users
mailing list