RE: How secure should it be? (was RE: password stores?)

2002-07-25 Thread Rowland, Alan D


Ah, There's the rub. Access has a range from open to closed. The point you
choose along that line directly effects cost and ease of use.

Put another way, Careful what you ask for, you may get it.

Best regards,
_
Alan Rowland

To quote another NANOG poster's sig file that applies to this discussion:
Wrong questions are the leading cause of wrong answers.


-Original Message-
From: Sean Donelan [mailto:[EMAIL PROTECTED]] 
Sent: Wednesday, July 24, 2002 10:19 PM
To: [EMAIL PROTECTED]
Subject: How secure should it be? (was RE: password stores?)


snip...
Should we secure routers better, worse or the same as burglar alarms?

While I agree there are settings which are insecure, its seems like we
haven't figured out the optimum level of security yet.  Which may be less
than what the experts think.





RE: Draft of Rep. Berman's bill authorizes anti-P2P hacking

2002-07-25 Thread Rowland, Alan D


First I agree that this is BAD on general principle but...

IANAL but IMHO spewing cracked copies of say, Photoshop, or other copyright
violations might be considered probable cause with the specific place/things
being the share program and it's contents.

Sharing the content of your favorite program/CD/DVD with the world has never
met fair use.

I had significant input in my life regarding the difference between can
and may. IMHO significant numbers of net citizens have forgotten that
difference.

Just my 2¢.

Best regards,
_
Alan Rowland


-Original Message-
From: Joseph T. Klein [mailto:[EMAIL PROTECTED]] 
Sent: Thursday, July 25, 2002 12:16 PM
To: Marshall Eubanks; [EMAIL PROTECTED]
Subject: Re: Draft of Rep. Berman's bill authorizes anti-P2P hacking



I would argue that my home computer is the repository of my papers and
effects. No place in the below law does it limit the restriction to the
government only. Indeed any law passed giving sanction to any party having
the right IMHO is in direct violation of both the spiret and the letter of
the Bill of Rights.

Amendment IV

The right of the people to be secure in their persons, houses, papers, and
effects, against unreasonable searches and seizures, shall not be violated,
and no warrants shall issue, but upon probable cause, supported by oath or
affirmation, and particularly describing the place to be searched, and the
persons or things to be seized.

The dogs of stupidy have been unleashed.

--On Wednesday, 24 July 2002 12:40 -0400 Marshall Eubanks
[EMAIL PROTECTED] wrote:


 Thought this would be considered on-topic as guess who would have to 
 clean up the resulting messes...

 Regards
 Marshall Eubanks

--
Joseph T. Klein [EMAIL PROTECTED]

... preserve, protect and defend the constitution ...
 -- Presidential Oath of Office



RE: Draft of Rep. Berman's bill authorizes anti-P2P hacking

2002-07-25 Thread Rowland, Alan D


I'd get on my cell phone and call the police. That's their job. Of course
there is that little fact of having a legal right to the property in
question in the first place. :)

I fully agree this is Not Good (TM), hence the BAD in my response. Having
said that, satellite providers periodically 'kill' hacked access cards on
equipment in the user's home with no legal ramifications. How would this be
significantly different?  Waiving the fourth amendment flag is just FUD in
this case.

There's more than sufficient current law out there that applies in this
case. The entertainment industry just wants an even easier answer. They're
lazy. What's new?

WorldComm, Adelphia, AOL, (you and me next?), have made this industry and
its practices an easy target. Historically, market segments either clean up
their own act, or government steps in. I believe this business is at that
point now. How we act in the near future will greatly affect the amount of
government involvement we'll see. Arguing in support of haz0r/warez networks
won't help the cause.

To put a different spin on the DCMA/17USC512 takedown letter issue, does
this mean you support opt-out lists for Spam as apposed to opt-in? That's
how the entertainment industry views our current process. There's a lot of
disucssion on this list (actually OT but we see it here anyway) about
identifying questionable E-mail traffic (spam). Is it really that much
harder to identify questionable P2P traffic? Or are we all too busy
listening to our MP3s playlists and watching the latest Starwars rip?

Just my 2¢

Best regards,
_
Alan Rowland


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] 
Sent: Thursday, July 25, 2002 1:57 PM
To: Rowland, Alan D
Cc: [EMAIL PROTECTED]
Subject: Re: Draft of Rep. Berman's bill authorizes anti-P2P hacking 


On Thu, 25 Jul 2002 13:11:00 PDT, Rowland, Alan D
[EMAIL PROTECTED]  said:

 IANAL but IMHO spewing cracked copies of say, Photoshop, or other 
 copyright violations might be considered probable cause with the 
 specific place/things being the share program and it's contents.

If your house was broken into, and your TV stolen, and you were walking
along and saw it in your neighbor's living room through the window, would
that give you the right to go in and reclaim it?

Would it exempt you from having to pay for a new door to replace the one
that got broken down?

You might want to ask yourself why the now-standard 17USC512 takedown letter
isn't sufficient.

I wonder how many 'Hax0rs-R-Us' record labels are about to incorporate.

Bad JuJu.



OT: If you thought Y2K was bad, wait until cyber-security hits

2002-07-22 Thread Rowland, Alan D


(shooting self in foot...)

Just eliminate tech support and proprietary software! A list of our
settings is available at www.domain.com/settings. And don't call us with
tech problems. We don't do tech support.

I know of at least one ISP out there already doing this. Not that they're
highly successful, but imagine not having to tell someone, Yes, your
username and password are case sensitive and must be spelled exactly as
supplied. And it's .net, not .com ever again.

Or alternately just require registration through a BBS system as a clue
test. :)

(Waiting for visit from the sales/marketing/shareholder folk...)

Best regards,
_
Alan Rowland

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] 
Sent: Saturday, July 20, 2002 10:03 PM
To: Scott Francis
Cc: [EMAIL PROTECTED]
Subject: Re: If you thought Y2K was bad, wait until cyber-security hits 


Snip...
I'll personally nominate for sainthood anybody who figures out how to make
it work for an ISP's terms of service. ;)
-- 
Valdis Kletnieks
Computer Systems Senior Engineer
Virginia Tech




OT: MTA. (Was) RE: Stop it with putting your e-mail body in ATT attachments. Its annoying and no one can see your message

2002-07-12 Thread Rowland, Alan D


Folk,

This is like the insurance industry basing rates on auto make/model. While
that is one factor, the much more important factor is the driver. It's the
user, not the MTA, that 'spreads' viri. This problem is not limited to
AOL/MSNites. And if techies are so much better why are there compromised
IIS, Apache, FTP, etc. machines around months and often years after fix
releases?

To paraphrase someone you may be familiar with,

Be conservative in what you send and liberal in what you accept.

I'm much more interested in the message than the medium. :)

-Al Rowland

Just my 2¢, feel free to use your delete key.


-Original Message-
From: Matthew S. Hallacy [mailto:[EMAIL PROTECTED]] 
Sent: Friday, July 12, 2002 1:32 AM
To: [EMAIL PROTECTED]
Subject: Re: Stop it with putting your e-mail body in ATT attachments. Its
annoying and no one can see your message



On Tue, Jul 09, 2002 at 09:36:43PM -0700, Majdi S. Abbas wrote:

[snip]
   The breakdown:
 
   Microsoft   38.71% (not even half the way to 90%)
   Mozilla 11.41%
   Eudora  10.86%
   ELM 6.63%
   exmh5.25%
   Web Mail5.20%
   Mutt4.70%
   New MH  3.64%
   VM  2.36%
   Mulberry1.90%
   Gnus1.27%
   MH  0.96%
 
[snip]
   --msa

Close, but no banana for you:

26.1534 percent, Pine
20.2465 percent, Microsoft Total (Outlook, Outlook Express, Exchange, etc)
15.5250 percent, Mutt 7.7120 percent, Microsoft Outlook 7.6985 percent,
Internet Mail Service (Exchange) 5.7049 percent, Eudora 5.2738 percent,
Mozilla (Netscape) 4.7013 percent, Microsoft Outlook Express 3.6102 percent,
Unknown (536 messages were not identifiable) 3.2734 percent, Elm 2.1823
percent, exmh 1.6232 percent, Web Mail 1.4144 percent, Gnus/Emacs 1.2326
percent, Mulberry 0.9160 percent, VM 0.7139 percent, Yahoo! 0.4715 percent,
Hotmail 0.3839 percent, Lotus Notes 0.3166 percent, The Bat! 0.3031 percent,
KMail 0.2896 percent, Apple Mail 0.2694 percent, Pocomail 0.2694 percent, MH
0.2627 percent, Evolution 0.2088 percent, DMailWeb Web to Mail Gateway
0.2021 percent, Mahogany 0.1414 percent, Squirrel Mail 0.1414 percent,
CommuniGate Pro Web Mailer 0.1347 percent, mh-e 0.1145 percent, IMail 0.1078
percent, Sylpheed 0.1010 percent, Microsoft-Entourage 0.1010 percent, Mew
version x.xx on Emacs 0.0943 percent, dtmail 1.3.0 @(#)CDE Version 0.0741
percent, Tellurian WebMail 0.0674 percent, tin 0.0674 percent, Forte Agent
0.0539 percent, My Own Email 0.0471 percent, ZMail 0.0471 percent, Mail
User's Shell 0.0404 percent, MailRoom For Internet Mail 0.0269 percent,
stuphead ver. 0.5.3 (Wiskas) 0.0269 percent, MIME-tools 4.104 (Entity 4.117)
0.0202 percent, your-mom-encapsulated-in-smtp 0.0202 percent, Vivian Mail
0.0202 percent, PostOffice 0.0202 percent, Mirapoint Webmail Direct 0.0202
percent, Becky! 0.0135 percent, Excite Inbox 0.0135 percent, /bin/bash
0.0135 percent, AeroMail 0.0067 percent, XFMail 0.0067 percent, WorldClient
Standard 0.0067 percent, TWIG 0.0067 percent, The Rodent, go figure. 0.0067
percent, TBBS/TIGER v1.0/PRIMP 1.56p 0.0067 percent, slrn 0.0067 percent,
Opera 0.0067 percent, emacs 20.5.1 (via feedmail 8 I) 0.0067 percent,
Calypso

Total messages: 14847

This resulted from checking X-Mailer, User-Agent, and Message-ID as a last 
resort (yahoo, hotmail, pine..), timespan is from Feb 2001 to now.

-- 
Matthew S. HallacyFUBAR, LART, BOFH Certified
http://www.poptix.net   GPG public key 0x01938203



RE: OT: MTA. (Was) RE: Stop it with putting your e-mail body in ATT a ttachments. Its annoying and no one can see your message

2002-07-12 Thread Rowland, Alan D


Actually, it's Outlook XP running on Win2000 Workstation. 

Hey, I did post plain text...

satire
Do you always judge people by their clothes/skin color? ;0
/satire

Best regards,
_
Alan Rowland

-Original Message-
From: Patrick Thomas [mailto:[EMAIL PROTECTED]] 
Sent: Friday, July 12, 2002 9:10 AM
To: Rowland, Alan D
Cc: [EMAIL PROTECTED]
Subject: Re: OT: MTA. (Was) RE: Stop it with putting your e-mail body in ATT
a ttachments. Its annoying and no one can see your message




 Be conservative in what you send and liberal in what you accept.

I seriously doubt anyone clicking away with outlook running on XP posing on
a technical list has any idea where the above comes from and what it refers
to.



OT: Total Traffic. Was: Sprint peering policy

2002-07-02 Thread Rowland, Alan D


Richard,

I know a few news server admins who might disagree with you. Or at least it
seems that way at times. ;)

I typically have a 251Kbps (broadband) stream from www.thebasement.com.au
running in the background when on line. The stream is coming out of
Australia (don't think it's been Akakamized yet. Did I spell that right?) so
that stream is on a US backbone. That's in addition to anything else I may
be doing. This is only a single point of data but single points eventually
add up to a bucket.

Additional thoughts. Wonder what that peak traffic would be if individual
sites and services weren't as rate limited as most are by pipe size,
hardware or software? Or how about a 6Gbps HDTV video conference stream
(UCLA (?)- MIT on Internet2).

Just my 2¢. The delete key is your friend.

-Al Rowland

-Original Message-
From: Richard A Steenbergen [mailto:[EMAIL PROTECTED]] 
Sent: Monday, July 01, 2002 6:07 PM
To: Stephen J. Wilcox
Cc: Deepak Jain; Miquel van Smoorenburg; [EMAIL PROTECTED]
Subject: Re: Sprint peering policy



On Tue, Jul 02, 2002 at 12:47:36AM +0100, Stephen J. Wilcox wrote:
 
 I'm curious about all these comments on bandwidth, few Mbs is 
 nothing, dropping OC48 to IXs.
 
 Theres an imbalance somewhere, everyone on this list claims to be 
 switching many gigs of data per second and yet where is it all going? 
 Not on the IX graphs anyway
 
 Did someone mention large bandwidths and everyone else felt they 
 needed to use similar figures or is everyone really switching that 
 amount but just hiding it well in private peerings? I know theres some 
 big networks on this list but theres a lot more small ones..

It's all so much posturing, just like the people who claim they need OC768
now or any time in the near future, or the people who sell 1Mbps customers
on the fact that their OC192 links are important.

If there is more than ~150Gbps of traffic total (counting the traffic only
once through the system) going through the US backbones I'd be very
surprised.

-- 
Richard A Steenbergen [EMAIL PROTECTED]   http://www.e-gerbil.net/ras
PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)



RE: Fwd: WorldCom Investor News: WorldCom Announces IntentiontoRestate 2001 and First Quarter 2002 Financial Statements

2002-06-26 Thread Rowland, Alan D


RoadRunner is also involved in supplying TWC service (Time Warner Cable). As
a former RoadRunner then MediaOne then ATTBI customer, I believe RoadRunner
best fits as a sort of Covad in Cable land. 

Just my WAG (Wild Axx Guess)

Best,

Al

-Original Message-
From: Pawlukiewicz Jane [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, June 26, 2002 8:53 AM
To: Andy Warner; [EMAIL PROTECTED]
Subject: Re: Fwd: WorldCom Investor News: WorldCom Announces
IntentiontoRestate 2001 and First Quarter 2002 Financial Statements


Andy Warner wrote:
 
 Neither WCOM, nor T owns Cox. Cox is independent. T recently acquired
 Comcast which may be the source of your confusion.

I am always confused.

No, I think the source of my confusion is RoadRunner. Its all over their
website, and that's a ATT name. isn't it? at least it was...

Jane
 
 --
 Andy Warner
 
 On Wed, 26 Jun 2002, Pawlukiewicz Jane wrote:
 
  Hey,
 
  dumb question. Does WCOM own Cox? Or is that ATT?
 
  Just curious.
 
  Jane
 
snip



RE: ATTBI refuses to do reverse DNS?

2002-06-18 Thread Rowland, Alan D


As an ATTBI customer at home (only [reasonably priced] high speed available
in the area), the recent network/service changes being rolled out have a
high negative pressure coefficient. Haven't tried FTP lately, will have to
see if it still works on 'my' network tonight! I do know their USENET feed
has gotten 'interesting' in the last week. Lots of 'there is no such group'
with lots of new, mainly full of 'local' spam groups and significant numbers
of 'no new articles' for days in normally high traffic hierarchies. Almost
seems like their services are now being admin'd in China or something.

Just my 2¢. The delete key is your friend.

-Al

-Original Message-
From: Lou Katz [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, June 18, 2002 11:31 AM
To: [EMAIL PROTECTED]
Subject: ATTBI refuses to do reverse DNS?



A client of mine just discovered that he could no longer do ftp
transfers to my machine. His IP address had changed to one in
12.240.20 and there is no reverse DNS for that block. His
previous assignment was in a totally different block which did
have reverse DNS. Calls to ATTBI got the answer that they
are not obligated to provide reverse DNS and have no plans to
do so. My servers refuse connections when there is no reverse
lookup.

Is this common?

-- 
I suppose I could set up a bogus reverse for him, but, feh...

-=[L]=-



RE: LEAP Security Vulnerabilities??

2002-06-13 Thread Rowland, Alan D
Title: LEAP Security Vulnerabilities??



If 
you're serious enough about security to find 128 WEP inadequate, I would think 
you would be doing some sort of VPN or other SSL solution anyway, making WEP 
redundant. Or am I missing something?

Best,

-Al 
Rowland

  -Original Message-From: Hyska, Jason [JJCUS] 
  [mailto:[EMAIL PROTECTED]]Sent: Thursday, June 13, 2002 10:15 
  AMTo: [EMAIL PROTECTED]Subject: LEAP Security 
  Vulnerabilities??
  I am well aware of the many security vulnerabilities that 
  exist on wireless networks as well as the inadequacies of WEP. I was 
  curious if anyone has had any experiences with Cisco's LEAP authentication 
  protocol? I have scoured the net for reviews or documents examining any 
  potential vulnerabilities, but have not been able to find any. Any and 
  all help or information would be appreciated.
   Thanks in advance, Jason Hyska Worldwide Information 
  Security Johnson  Johnson [EMAIL PROTECTED]  



OT: Trying to find a connectivity provider that wont go under (was RE: CAIS/Ardent and now Network Access Solutions)

2002-05-31 Thread Rowland, Alan D


But you have Drew Carey!

What about cable access? It's more and more an option that has, IMHO,
significant benefits over DSL. No PPPoE for starters...

Unless you're in a business zone. :(

-Al

-Original Message-
From: Steven J. Sobol [mailto:[EMAIL PROTECTED]]
Sent: Thursday, May 30, 2002 7:10 PM
To: Brian
Cc: Deepak Jain; [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: RE: Trying to find a connectivity provider that wont go under
(was RE: CAIS/Ardent and now Network Access Solutions)



On Thu, 30 May 2002, Brian wrote:

 Surprised there isnt much connectivity in the Detroit area, I mean it is
 Motor City and all, I would think tons of manufacturing palnts all needing
 telecom of some sort or other..

Try to get DSL here; everyone backhauls to Chicago. And Cleveland is the
25th largest city in the USA. Lots of local providers for DS1 and Frame 
and ATM, just not DSL. :)

-- 
Steve Sobol, CTO (Server Guru, Network Janitor and Head Geek)
JustThe.net LLC, Mentor On The Lake, OH  888.480.4NET   http://JustThe.net
In a 32-bit world, you're a 2-bit user/You've got your own newsgroup:
alt.total.loser   - Weird Al Yankovic, It's All About the Pentiums





RE: operational: icmp echo out of control?

2002-05-28 Thread Rowland, Alan D


We had one user report our DNS servers were hacking his system. Knew enought
to do a whois but didn't have any clue beyond that. :)

(lots of port 53 activity in the logs every time he surfed the web...)

Best,

-Al

-Original Message-
From: Richard A Steenbergen [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, May 28, 2002 1:01 PM
To: Mike Tancsa
Cc: Jeff Mcadams; [EMAIL PROTECTED]
Subject: Re: operational: icmp echo out of control?



On Tue, May 28, 2002 at 03:36:08PM -0400, Mike Tancsa wrote:
 
 Jeu 09 mai 2002 15:30:22, Port 3, ICMP, Destination Unreachable
 Jeu 09 mai 2002 15:30:21, Port 3, ICMP, Destination Unreachable
 Jeu 09 mai 2002 15:30:10, Port 3, ICMP, Destination Unreachable
 Jeu 09 mai 2002 15:30:09, Port 3, ICMP, Destination Unreachable

I don't know whats worse, those crappy personal firewalls that make every
packet look like a life or death assault, or the idiots who send abuse
email demanding that you do something for them or they will sue and/or
hax0r you.

I've seen supposed security professionals for theoretically clued places
like NASA send abuse complaints over traceroutes they've originated, and
people complain about port 80 hacking attempts then flatly refuse to 
admit they visited website.

At best, it's annoying clutter. Is it any wonder that legitimate emails
about ongoing DoS attacks are completely ignored or responded to a week
later? At worst, it can get innocent people in trouble and cost them a lot 
of time, effort, and potentially money.

These false abuse reports are FAR too common, and the net equivilent of
crying wolf. In my opinion, it is the responsability of these personal
firewall makers to at least make an EFFORT to warn their users about this.
So far, I havn't seen it.

-- 
Richard A Steenbergen [EMAIL PROTECTED]   http://www.e-gerbil.net/ras
PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)



RE: Routers vs. PC's for routing - was list problems?

2002-05-24 Thread Rowland, Alan D


AFAIK standard (non-proprietary) CompactFlash, SmartCards, Memory Stick, et
al, are seen as (removable) storage with typical allowed attributes. I can
set a file/folder/card to 'locked' in my camera but when plugged into the
computer this will show as 'read only.'

Then again, router manufacturers are infamous for jiggering as much as
possible to proprietary. Might still be able to 'administer' the card in
another machine then install it in the proprietary device but that might
void your warranty. :)

Hey, they're just protecting their market share, right? Worked for Apple,
oh, wait a minute... (/mnt asbestos underwear)

Just my 2¢.

-Al

-Original Message-
From: Steven J. Sobol [mailto:[EMAIL PROTECTED]]
Sent: Thursday, May 23, 2002 2:39 PM
To: Dan Hollis
Cc: E.B. Dreger; Vinny Abello; [EMAIL PROTECTED]
Subject: Re: Routers vs. PC's for routing - was list problems?



On Thu, 23 May 2002, Dan Hollis wrote:
 
 On Thu, 23 May 2002, Steven J. Sobol wrote:
  On Thu, 23 May 2002, E.B. Dreger wrote:
   EIDE-based flash drives have become very inexpensive.  Some
   embedded systems use CompactFlash boards.
  Can you set flash drives to be write-only?
 
 Why would you want to do this?

Duh. Sorry about the brainfart. I was about to launch into a long 
explanation of what I want to do when I realized I wrote write-only
instead of read-only. I meant read-only.

Note to self: Engage brain *before* fingers.

-- 
Steve Sobol, CTO (Server Guru, Network Janitor and Head Geek)
JustThe.net LLC, Mentor On The Lake, OH  888.480.4NET   http://JustThe.net
In a 32-bit world, you're a 2-bit user/You've got your own newsgroup:
alt.total.loser   - Weird Al Yankovic, It's All About the Pentiums





RE: Routers vs. PC's for routing - was list problems?

2002-05-24 Thread Rowland, Alan D


Most flash media includes read only 'tabs' similar to the legacy floppy
variety. Steven may have hit on an interesting solution here...

-Al

-Original Message-
From: E.B. Dreger [mailto:[EMAIL PROTECTED]]
Sent: Thursday, May 23, 2002 2:38 PM
To: [EMAIL PROTECTED]
Cc: Dan Hollis; Steven J. Sobol; Vinny Abello; [EMAIL PROTECTED]
Subject: Re: Routers vs. PC's for routing - was list problems?



JKS Date: Thu, 23 May 2002 17:34:29 -0400 (EDT)
JKS From: Jason K. Schechner


JKS  Why would you want to do this?
JKS 
JKS Logging.  If a h@xx0r cracks your box he can't erase
JKS anything that's already been written there.  Often it takes

BSD enforces append-only when running proper securelevel.  AFAIK,
Linux lacks this attribute, and root can disable the so-called
immutable attrib.


JKS a physical change (jumper, dipswitch, etc) to change from
JKS write-only to read-only making it pretty tough for the
JKS h@xx0r to cover his steps.

Why not log to an external bastion host?


--
Eddy

Brotsman  Dreger, Inc. - EverQuick Internet Division
Phone: +1 (316) 794-8922 Wichita/(Inter)national
Phone: +1 (785) 865-5885 Lawrence

~
Date: Mon, 21 May 2001 11:23:58 + (GMT)
From: A Trap [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Please ignore this portion of my mail signature.

These last few lines are a trap for address-harvesting spambots.
Do NOT send mail to [EMAIL PROTECTED], or you are likely to
be blocked.



RE: Certification or College degrees? Was: RE: list problems?

2002-05-22 Thread Rowland, Alan D


While the effectiveness of degree requirements may be argued, they are
efficient. When your HR department gets hundreds or thousands of
applications, they need some way to find the wheat.

The net sector is young and was mostly immune to traditional business
practices. Not all traditional business practices are bad (see dot.bomb).
Lack of business acumen means the days of six figure income and significant
stock options because there were 10 job openings for every geek who could
RTFM are over. Even though the job market is coming back there's still 20
'techies' in Birkenstocks and Star Wars t-shirts for every (decent) job
hiring. Everything else being equal (which is often the case) a cert or
degree is a great tie-breaker.

Welcome to the traditional job market fellow geeks. Remember all the jokes
about Sanitation Engineers? ;)

Put another way, when you take that expensive car of yours in for service
(you do have one if you're successful in this industry, right? ;) ), do you
go to Joe's Garage (apologies to all named Joe) or a dealer/service center
with certified mechanics?

Just my 2¢. The delete key is your friend.

Best regards,
_
Alan Rowland
(BS in Business and Management, UofM, 1990
no warranty expressed or implied, use at 
your own risk, may be terminated at any 
time without notice





-Original Message-
From: Christopher J. Wolff [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, May 22, 2002 11:16 AM
To: [EMAIL PROTECTED]
Subject: Certification or College degrees? Was: RE: list problems?



I would add to that statement:  Requiring a technology certification is
equally as obsurd.  I've been told I could pass the Emperor-Level CCIE
test; however, I do not believe it will add more value for my customers.

Regards,
Christopher J. Wolff, VP CIO
Broadband Laboratories
http://www.bblabs.com
 

Andrew Dorsett said:
*jumping on my soap box*
I have to say that the idea of requiring a degree for the IT industry is
obsurd.  



RE: anybody else been spammed by no-ip.com yet?

2002-05-09 Thread Rowland, Alan D


For more on EarthLink's Port 25 policy see:

http://help.earthlink.net/port25/

Best regards,

Al Rowland

-Original Message-
From: Joel Baker [mailto:[EMAIL PROTECTED]]
Sent: Thursday, May 09, 2002 7:26 PM
To: [EMAIL PROTECTED]
Subject: Re: anybody else been spammed by no-ip.com yet?



On Fri, May 10, 2002 at 11:27:10AM +1000, Terence Giufre-Sweetser wrote:
 
 Now there's a good idea, and it works, I have several sites running a
 port 25 trap to stop smtp abuse.
 
 To stop port 25 abuse at some schools, the firewall grabs all outgoing
 port 25 connections from !the mail server, and to !the mail server,
 and runs then via the mail server, which stops header forging, mass rcpt
 to: abuse, and vrfy/expn probing. Anything that goes past the filters has
 a nice clear and traceable received by: line.
 
 If a few of the larger pre-paid isp's could simply filter port 25 on their
 accounts, add some sanity checking (like, a user must be using a valid
 email address in the from:/return-path:/reply-to: lines, etc) and reject
 other abuse like rcpt to: stacking.  Plus, add a anti-bulk email check,
 like razor or checksum clearinghouse, (yeah, seriously, checksum the
 outgoing emails, if some humans somewhere have said this is spam, then
 /dev/null or BOUNCE the outgoing email.)
 
 I'd even be inclined to place these filters at the border to smaller
 downstream isp's, let them register their valid email domains, any user
 from their network trying to send invalid email, or email that is listed
 in razor, just kill it or auto-refer to the abuse desk.
 
 [This may sound expensive, but on reflection, a US$2K box with BSD could
 handle 20Mbps of port 25, remember only port 25, nothing else, you would
 place one behind your dial up infrastructure, or several for a large site,
 and your transparent smtp proxy would pay for itself by killing off a
 lot of your abuse@ work.  There was many ways of redirecting the port 25
 packets, have a look at all the good work done on port 80 transparent
 proxies.]
 
 // :), patent pending? No, the concept is hereby commited to the public
 domain. //

Earthlink was doing this for basically all of their consumer-grade (dialup,
most of the ADSL, etc) customers in 1999 (well, almost certainly earlier
than that, but I can only personally speak to it being in place then). It
doesn't stop absolutely everything, but it's a very good 95% first pass
filter. Don't forget to allocate support queue time for explaining to
folks why they can't do SMTP relaying through their other provider where
they have a hosting account, though...

(Business customers were exempted, but paid hefty setup fees and monthly
fees, and if I recall the contract correctly, forfeited all of them for
AUP violations, which explicitly included UCE).

Keeping the filters up to date is often a painful excercise in assignment
coordination testing, too...
-- 
***
Joel Baker   System Administrator - lightbearer.com
[EMAIL PROTECTED]  http://users.lightbearer.com/lucifer/



RE: CIA Warns of Chinese Plans for Cyber-Attacks on U.S.

2002-04-26 Thread Rowland, Alan D


No. What's hard to believe is that anyone would find that
surprising/newsworthy.

My last post on this OT subject. Really. I promise...

-Al

-Original Message-
From: Deepak Jain [mailto:[EMAIL PROTECTED]]
Sent: Thursday, April 25, 2002 3:02 PM
To: Steve Goldstein; Rowland, Alan D
Cc: [EMAIL PROTECTED]
Subject: RE: CIA Warns of Chinese Plans for Cyber-Attacks on U.S.



Is it really hard to believe that the Chinese government would actively fund
cyberterrorism?

Deepak Jain
AiNET

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
Steve Goldstein
Sent: Thursday, April 25, 2002 5:55 PM
To: Rowland, Alan D
Cc: [EMAIL PROTECTED]
Subject: RE: CIA Warns of Chinese Plans for Cyber-Attacks on U.S.



Gosh, oh golly-gee, do you really think that they would do something
like that (planting a story)?

;-)

--Steve

At 7:16 AM -0700 4/25/02, Rowland, Alan  D wrote:

Someone in the CIA is looking for funding...

Just my 2¢.

-Al


--




RE: How to get better security people

2002-03-26 Thread Rowland, Alan D
Title: RE: How to get better security people



A 
knowledgeable investor would ask your HR department a few 
questions:

1. 
Which half of the resume do you believe?

2. Is 
it really more economical to ignore half your talent than spend a little 
checking resumes?

3. 
What does it say about your company's ethics that you accept that all your 
employees are liars?

but 
then you have to find that knowledgeable investor first...

Just 
my 2¢ and in similar circumstances,

-Al

USAF 
Ret.

  -Original Message-From: James Smith 
  [mailto:[EMAIL PROTECTED]]Sent: Tuesday, March 26, 2002 12:03 
  PMTo: '[EMAIL PROTECTED]'; '[EMAIL PROTECTED]'; 
  '[EMAIL PROTECTED]'Cc: '[EMAIL PROTECTED]'; 
  '[EMAIL PROTECTED]'Subject: RE: How to get better security 
  people
  -Original Message- From: 
  [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] 
  Sent: Tuesday, March 26, 2002 2:41 PM To: [EMAIL PROTECTED]; [EMAIL PROTECTED] Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: RE: 
  How to get better security people 
  | The problem right now is if you advertise for a job, you 
  will get | blasted with literally tens of thousands of 
  resumes. What should I | be telling the HR 
  department to look for? 
  New careers. 
   Sean. 
  = 
  That's the problem. Too many folks seeing the big money going 
  to the tech weenies, and upon taking an MCSE boot camp, think they now qualify 
  for a senior Admin/Security job. That and resume inflation, real or percieved. 
  Too much noise in the system and inefective noise reduction 
  methods...
   My resume is factual, and when I got out of the 
  military, I was penalized by my first civilian employer. When I stated I could 
  in fact set up a needed DNS, I was told they would hire it out. I asked why 
  hire it out when I could do it. I was told, "we only believe half of any 
  resume we get, and we don't think that you have the necessary experience." If 
  setting up and running deleted.af.mil (now gone), and doing the very 
  first deleted.af.mil DNS located on the base (complete with off-site 
  secondaries), and running it until transitioned about a year later to the comm 
  squadron folks I trained didn't count, then what did?
  Not bitter, though. Got a new employer... 
  James H. Smith II NNCDS NNCSE Systems 
  Engineer The Presidio Corporation