On Tue, 22 Mar 2005, Zak B. Elep wrote: > For hackers, its security and fish (or peace) of mind. The seasoned > sysadmin who's insane enough to write rulesets blindfolded would > appreciate the level of control he/she has over a custom firewall. Whats > more, such appliances can also be configured to do other things (like > act as a honeypot faking a node), or for more sophisticated setups, even > only exist in software (like uml). Just be careful, or it'll be more a > conflagration spreading inward the network instead of a barrier outside.
On the other hand it also means if you commit a mistake in the ruleset, you get fried ... but how sure are you that the firewall appliance is doing what you wanted...? -- Kelsey Hartigan Go Linux Registered User #5998 -- Philippine Linux Users' Group (PLUG) Mailing List [email protected] (#PLUG @ irc.free.net.ph) Official Website: http://plug.linux.org.ph Searchable Archives: http://marc.free.net.ph . To leave, go to http://lists.q-linux.com/mailman/listinfo/plug . Are you a Linux newbie? To join the newbie list, go to http://lists.q-linux.com/mailman/listinfo/ph-linux-newbie
