On Tue, 22 Mar 2005, Zak B. Elep wrote:

> For hackers, its security and fish (or peace) of mind. The seasoned
> sysadmin who's insane enough to write rulesets blindfolded would
> appreciate the level of control he/she has over a custom firewall. Whats
> more, such appliances can also be configured to do other things (like
> act as a honeypot faking a node), or for more sophisticated setups, even
> only exist in software (like uml). Just be careful, or it'll be more a
> conflagration spreading inward the network instead of a barrier outside.

On the other hand it also means if you commit a mistake in the ruleset,
you get fried ...  but how sure are you that the firewall appliance is
doing what you wanted...?


-- 
Kelsey Hartigan Go
Linux Registered User #5998



--
Philippine Linux Users' Group (PLUG) Mailing List
[email protected] (#PLUG @ irc.free.net.ph)
Official Website: http://plug.linux.org.ph
Searchable Archives: http://marc.free.net.ph
.
To leave, go to http://lists.q-linux.com/mailman/listinfo/plug
.
Are you a Linux newbie? To join the newbie list, go to
http://lists.q-linux.com/mailman/listinfo/ph-linux-newbie

Reply via email to