On Thu, 21 Sep 2006, Joel Jaeggli wrote: > Gadi, your initial query lacked the factual background that would have > been useful for someone to decide if it was relevant to them or not. > While I do believe that the intersection of host and applications issues > and networking has applicability here I will make two observations that > I hope are not wildly off the mark. > > Many of the people on the operations side of networks do not spend a lot > of time on security mailing lists. They also don't spend a lot of time > looking into their own support organizations until until problems get > escalated to them, so your initial post could have used more background. > > Even in an enterprise it's really hard to justify the expenditure that a > rapid response to a host security problem involves. For an isp which is > not likely to be in the position to recover the cost of being reactive > let alone pro-active I can't imagine how they would possibly support > desktop issues like this.
Thank you, I will make sure and learn from this in the future! Gadi. > > joelja > > > Thanks, > > > > Gadi. > > -- > ------------------------------------------------------------------------ > Joel Jaeggli Unix Consulting [EMAIL PROTECTED] > GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2 >