on 15/7/02 12:02, Brian L. Matthews at [EMAIL PROTECTED] wrote: > time cost insurance policy, that may save you from having to cancel > all your credit cards, or explain to your ISP how it wasn't really > you participating in the DDoS attack, just your computer.
This is one argument I do not understand -- who in their right mind leaves credit card info on a PC where anyone can have easy access. I'd be much more worried about someone walking in and using a computer directly than having them hack it from farther afield. I back my machine up & can't really think of any info stored on the machine that isn't available elsewhere. A successful hack might be interesting -- I'd be able to learn a thing or two in that case about cleaning up after a hack (then again, I don't run with default passwords, all my OS X accounts have passwords, and I only run the Apache personal server in OS X as a web service). A firewall is a neat idea, but it requires computing time, adds yet *one* more app to crash your system and is only as good as its configuration will allow it to be. If you don't run any web services and either don't run OE of Explorer for Winblows, or if you do, blindly run apps, and running Explorer in low security mode (which I always do -- I turn off every security feature in the book... usually causes more headaches than it's worth ;) you're pretty much safe. My installs of Mac OS 9 have been hack-proof without someone *physically* accessing my computer -- they simply didn't run any web services. A similar situation exists for Winblows machines that I run/have ever used -- don't run web services and you're fine. For that matter, unless you're running a secure OS, *every* OS is vulnerable & can be opened up with physical access to the computer (some will be require more know how than others (I could do Mac OS or Windows, but OS X and Linux would be beyond my computing skill without detailed instructions)). PS I do see a use for firewalls -- keeps snoopers at bay & you can drive sys admins up the wall (they know you're up, they'd like to know what services you're running but if you include their IP in the blocked list they'll be at a loss (unless they switch machines... unless you have a permitted list in which case that won't even help) ;) Eric. -- G-List is sponsored by <http://lowendmac.com/> and... Small Dog Electronics http://www.smalldog.com | Refurbished Drives | -- We have Apple Refurbished Monitors in stock! | & CDRWs on Sale! | Support Low End Mac <http://lowendmac.com/lists/support.html> G-List list info: <http://lowendmac.com/lists/g-list.shtml> Send list messages to: <mailto:[EMAIL PROTECTED]> To unsubscribe, email: <mailto:[EMAIL PROTECTED]> For digest mode, email: <mailto:[EMAIL PROTECTED]> Subscription questions: <mailto:[EMAIL PROTECTED]> Archive: <http://www.mail-archive.com/g-list%40mail.maclaunch.com/> Using a Macintosh? Get free email and more at Applelinks! <http://www.applelinks.com>
