On Sat, Dec 03, 2005 at 04:06:45PM -0700, Brian Phillips wrote: > > I'm not arguing that authentication is the solve-all, because when I was > referring to the on-campus incident, it happened just a few days ago (when > we most certainly had authentication in place). The user got a worm, and in > seconds it had killed the hub he was on, and even went far enough to down > the switch the hub was connected to. That was an entire building of people, > and I'm sure the user had authenticated before he got it.
Knowing who own's a computer with a worm doesn't make it any easier to solve the problem. You still have to track down where it's happening and remove the computer from the network. IP and MAC addresses are all it takes. > Famous quote: "It's not a good system, but it's better than the rest." From whose perspective is it better? From the perspective of the morons that shut down your connection because you open a few ssh connections and who think that they're being reasonable? > At my last college, we actually had to register our computers with OIT > on a semesterly basis, where they would check to see we had > anti-virus, and give us a username and password that would last for a > semester. This was only wireless service, there were no public jacks > that we could use. These checks required you to stand in line with > your laptop and show the techie that you had an antivirus program that > was up to date. Very annoying. Very annoying. But at least they didn't make you go there several times a day. Like OIT does. -- Andrew McNabb http://www.mcnabbs.org/andrew/ PGP Fingerprint: 8A17 B57C 6879 1863 DE55 8012 AB4D 6098 8826 6868
pgpM6fkm1W8Ok.pgp
Description: PGP signature
-------------------- BYU Unix Users Group http://uug.byu.edu/ The opinions expressed in this message are the responsibility of their author. They are not endorsed by BYU, the BYU CS Department or BYU-UUG. ___________________________________________________________________ List Info: http://uug.byu.edu/cgi-bin/mailman/listinfo/uug-list
