On 17 May 2002 at 14:03, Adam Shephard wrote:
I suffer from a logic deficiency and I've been tossing an idea around
in my head. I thought it might be a good idea to run the logic past
the people here. I have a firewall between my network and the world
and Snort behind my firewall. That Snort
- Original Message -
From: Mike Shaw [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Thursday, March 07, 2002 06:25
Subject: VLAN as a DMZ
There are definitely textbook reasons (secondary compromize issues, etc),
but does anyone know of a specific technical reason why using a VLAN for a
There's some links here:
http://www.infosyssec.com/infosyssec/seceth1.htm
- Original Message -
From: Michael Bulebush [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Friday, March 08, 2002 04:31
Subject: Email Privacy Policies
Anyone have any links to (or copies of) Email Privacy
- Original Message -
From: Billy D Walls [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Saturday, February 23, 2002 13:54
Subject: A question on the law.
If one where to find, say, 44 networks in one night while war driving, and
with net stumbler and windows, is able to jump on those
Assuming the 192.168 address was the source, remember that routing decisions
are made on the destination address, not the source. Routing will not
prevent a packet with a private source IP from traversing the Internet, but
it will almost certainly stop any return packet from making it back to