But all this kind of abuses would just have been avoided by a simple access
list on the internet access router, no?

At 16:23 31/01/00 -0500, you wrote:
>I just resolved a problem for a customer here that will go unnamed. The 
>customer had a PDC, an HTTP server and two FTP servers as well as an AIX 
>box and the workstations connected to an ISDN link (128K) with legal 
>addresses. The sysadmin kept having to add disks to the server but never 
>had the time to check where the space was going. I'm sure all of you can 
>guess. I put a firewall in the way and changed all internal addresses to 
>private (172.16-32) and had them change the passwords on the inside. The 
>firewall log went ballistic, and I was getting 300 - 500 attempts a day 
>from, 95% German hackers (I assume Warez) as well as some U.S. Military and 
>corporate servers (which where compromised of course). The customer now 
>finds that there is lots of space on the server and WOW is 128K FAST!
>
>         I explained to the customer that they where legally responsible 
>for the pornography and pirated software that was distributed by their 
>server. They where amazed that all that was going on without their 
>knowledge, and I explained that it was to the advantage of the hackers and 
>Warez operators that they keep the infected servers running as well as 
>possible.

_________________________________________________________________
Luc Amouriaux / Services R�seaux   Atos Infogerance
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to