Too true, but understated.  It's more the case I think that at present, they are
too complex for all but the most savvy and focused professional to keep up with
completely, and for the untrained person it is hopeless.  I personally have no idea
whether or not that last request for the NT CD undid any of the 38 security patches
I applied previously... Or even how many I ought to have applied but I missed
because I thought it was included in another patch, or was re-released and I
installed one with a vulnerability, or was identified as being for an application I
don't run (like the patches for Outlook Express that had to be applied to Outlook
from Office 97).

But one thing I am ABSOLUTELY sure of is that the average corporate user is NOT
capable of deciding intelligently if a request by XXX application to communicate on
port YYY is an ok thing or a bad thing.  So if there is any hope of catching this
at all, I must do it at the "Firewall" - or whatever you want to call this
"Enhanced Malcode Detection Device" that I maintain between myself and the most
likely transfer point for a payload.  Or deal with the consequences of it not being
detected.

Guy Skaggs


Gary Flynn wrote:

>  Computers are presently too complex for untrained personal
> to keep up completely with what code should be trusted and what code
> shouldn't be.

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to