I remember back in '00 when Norman Richards wrote:
> > Using what I assume to be your rationale, which I notice that you do
> > not address at all on your web site, then I would be justified using
> > SATAN or some other network security tool to probe your network
> > without your permission with the justification that if your network
> > is insecure, then it might pose a threat to my network should
> > crackers happen to compromise yours. I hope that you would agree
> > with me that doing that would not be right at all. [...]
> 
>   Could you expand some on this?  I'm not sure that I agree with your
> fundamental supposition here.  I'm not saying I disagree - I'm just
> that the statement you make is not "obviously true" to me and requires
> some supporting arguments.  (just curious)

Dunno, it seems to make sense to me.  Which part are you confused
by:  "Using ... compromise yours" or "I hope that ... at all" (or
neither).  I can kind of see the latter one being more objectionable
than the former, but I want to make sure we're on the same
page before addressing anything . . .

                Matt

--  
/* Matt Sayler -- [EMAIL PROTECTED] ---- (512) 494-7360
   "RFC 882 put the dot in .com." -- Christian Bauernfeind */
---------------------------------------------------------------------------
Send administrative requests to [EMAIL PROTECTED]

Reply via email to