On Fri, 31 Dec 2004 [EMAIL PROTECTED] wrote:
> > And where, exactly, do you draw the line between "firewall that blocks > unknown bits" and "virus-scanning front-end appliance that blocks unknown > MIME types" and "Great Firewall" that blocks all traffic that contains > subversive content..... > Personally I think the line should be drawn between the HIDS that rest after the NIDS appliance after the load balancer that falls in the ECM of Cisco's SAFE Campus Infrastructure Module that conforms to RFC's 12692 and RFC's 31337. Happy Nother Year! =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ J. Oquendo GPG Key ID 0x51F9D78D Fingerprint 2A48 BA18 1851 4C99 CA22 0619 DB63 F2F7 51F9 D78D http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x51F9D78D sil @ politrix . org http://www.politrix.org sil @ infiltrated . net http://www.infiltrated.net "How a man plays the game shows something of his character - how he loses shows all" - Mr. Luckey