On Tuesday 14 June 2005 15:49, Ronny wrote:
> Well you have covered just part of the security ,your
> connection to the office .But forgotten that you are
> using a rogue device to access your office.By the way
> the bad guy might be interested with what you have on
> your machine than what you are accessing!Well there
> will be a VPN to the office but not to the neighbours
> rite  ;-) .Am not good at VPN's but that what I think
> correct me if wrong

Then build a firewall, or implement some kind of access 
control. At the end of the day, you cannot blame the ISP 
for some cracker stealing your files after you logged 
onto the hotspot (unless the ISP was contracted to do so 
and failed to comply).

Mark.

Attachment: pgp2j8RK8qv3Q.pgp
Description: PGP signature

_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/

Reply via email to