Actually if you read the first post, he is trying to bypass his university's
security to get internet access.
        Tom Fredericks


-----Original Message-----
From: Dean Michael Dorman [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, July 10, 2001 12:50 PM
To: [EMAIL PROTECTED]
Subject: RE: FW-1.....devil's advocate


before anyone goes ona righteous jihad, did one ever think this guy may
be a newbie sys admin who was left with a locked down firewall and no
docs by the previous admin?  Could happen.  

Now, it *is* an interesting question because if there are s'kiddie tools
out there to do such a job, I'd like to know so that I may possibly
protect myself a bit better.

My 2 pesos,

Dean M. Dorman  (my real name)
Systems Administrator (my real title)
Putnam Company (my real company I really work for)


-----Original Message-----
From: Richard Golodner [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, July 10, 2001 3:31 PM
To: [EMAIL PROTECTED]
Subject: FW-1


DE BEERS- You have some nerve asking this list for ways to circumvent
the
security policies we work so hard to develop. Why don't you use your
real
name as that would allow us to check out who you are. Remember what list
you
are asking for help from...
 
Richard Golodner
_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls
_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls
_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls

Reply via email to