on 15/7/02 12:02, Brian L. Matthews at [EMAIL PROTECTED] wrote:

> time cost insurance policy, that may save you from having to cancel
> all your credit cards, or explain to your ISP how it wasn't really
> you participating in the DDoS attack, just your computer.

This is one argument I do not understand -- who in their right mind leaves
credit card info on a PC where anyone can have easy access. I'd be much more
worried about someone walking in and using a computer directly than having
them hack it from farther afield.

I back my machine up & can't really think of any info stored on the machine
that isn't available elsewhere. A successful hack might be interesting --
I'd be able to learn a thing or two in that case about cleaning up after a
hack (then again, I don't run with default passwords, all my OS X accounts
have passwords, and I only run the Apache personal server in OS X as a web
service).

A firewall is a neat idea, but it requires computing time, adds yet *one*
more app to crash your system and is only as good as its configuration will
allow it to be.

If you don't run any web services and either don't run OE of Explorer for
Winblows, or if you do, blindly run apps, and running Explorer in low
security mode (which I always do -- I turn off every security feature in the
book... usually causes more headaches than it's worth ;) you're pretty much
safe.

My installs of Mac OS 9 have been hack-proof without someone *physically*
accessing my computer -- they simply didn't run any web services. A similar
situation exists for Winblows machines that I run/have ever used -- don't
run web services and you're fine.

For that matter, unless you're running a secure OS, *every* OS is vulnerable
& can be opened up with physical access to the computer (some will be
require more know how than others (I could do Mac OS or Windows, but OS X
and Linux would be beyond my computing skill without detailed
instructions)).

PS I do see a use for firewalls -- keeps snoopers at bay & you can drive sys
admins up the wall (they know you're up, they'd like to know what services
you're running but if you include their IP in the blocked list they'll be at
a loss (unless they switch machines... unless you have a permitted list in
which case that won't even help) ;)

Eric.


-- 
G-List is sponsored by <http://lowendmac.com/> and...

 Small Dog Electronics    http://www.smalldog.com | Refurbished Drives |
 -- We have Apple Refurbished Monitors in stock!  |  & CDRWs on Sale!  |

      Support Low End Mac <http://lowendmac.com/lists/support.html>

G-List list info:       <http://lowendmac.com/lists/g-list.shtml>
Send list messages to:  <mailto:[EMAIL PROTECTED]>
To unsubscribe, email:  <mailto:[EMAIL PROTECTED]>
For digest mode, email: <mailto:[EMAIL PROTECTED]>
Subscription questions: <mailto:[EMAIL PROTECTED]>
Archive: <http://www.mail-archive.com/g-list%40mail.maclaunch.com/>

Using a Macintosh? Get free email and more at Applelinks! 
<http://www.applelinks.com>

Reply via email to