RE: SPEWS?

2002-06-20 Thread Benjamin P. Grubin
oorly-operated blacklists are not dangerous. That implies (to me!) an understatement of the potential effect of poorly-operated blacklists. If I am wrong in that implication, I apologise. -- Benjamin P. Grubin, CISSP, GIAC Information Security Consulting [EMAIL PROTECTED] > -Original

RE: SPEWS?

2002-06-20 Thread Benjamin P. Grubin
min P. Grubin, CISSP, GIAC Information Security Consulting [EMAIL PROTECTED] > -Original Message- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On > Behalf Of Steven J. Sobol > Sent: Thursday, June 20, 2002 10:21 PM > To: Benjamin P. Grubin > Cc: 'Dan Hollis&

RE: SPEWS?

2002-06-20 Thread Benjamin P. Grubin
became that due to adoption. There are numerous other examples of the line, and companies (or individuals) that cross it. It took decades of high prices and lousy service to force regulation on the telephone industry. I'd rather force appropriate controls to be in place before I get bent over for a few years waiting for the government to poorly regulate what may very well become an abusive industry. Cheers, Ben -- Benjamin P. Grubin, CISSP, GIAC Information Security Consulting [EMAIL PROTECTED]

RE: Re[8]: "portscans" (was Re: Arbor Networks DoS defense product)

2002-05-19 Thread Benjamin P. Grubin
merit, despite the vocal complaints. Why not discuss viable alternative trigger methods instead of whining about portscans? Cheers, Benjamin P. Grubin, CISSP, GIAC > -Original Message- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On > Behalf Of Greg A. Woods > Sent: Su

RE: [OT]Microsoft makes networked software 'illegal' on XPunless you pay them...

2002-04-21 Thread Benjamin P. Grubin
Err--I think you guys are reading too much into this. The license (to me, and IANAL), seems to indicate that the workstation cannot be used as a server unless you purchase server licenses. It strikes me that language very similar to this has been in the workstation products since NT4. I do,

RE: How to get better security people

2002-04-03 Thread Benjamin P. Grubin
It strikes me that much of the focus seems to be people on one hand wanting "deep security expertise", which is considered technical, and on another finding it difficult to actually have that single person be able to impact enterprise/network-wide security. Since "deep security" experts are a va