× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



> The internet vandals and thieves will be seen as a business risk just like
> the real world vandals and thieves.
Your internet presence should be evaluated for risk just like any other
business practice. You decide if you need a fence around your building,
alarms, perhaps an armed guard (try working downtown Miami's Gold
Exchange at night...). There is no one answer for all. There are accepted
security practices. Your business needs to evaluate risk, plan and implement
a solution. I have one customer who spent 2 years on web with no firewall,
until Code Red flooded the NT servers multiple times over 3 months.
Code Red has no interest in who you are! or how big a company!!!
It only knows ip address ranges. Given that, any business person who
ignores that basic levels of security is only rolling the dice.
If you want a good description of business risk to "regular" businesses,
read Kevin Mitnick's The Art of Deception... where it doesn't even
take a computer hack to get your info. You call employees, say the right
words, and your own employees will give it away..
jim

----- Original Message -----
From: "Booth Martin" <Booth@MartinVT.com>
To: <midrange-l@midrange.com>
Sent: Wednesday, December 04, 2002 3:00 PM
Subject: RE: Remote Access (Again)


>
>  Oh gosh Scott, thats like standing on a bridge over the LA Freeway and
> picking out cars by their license plate numbers.  Its possible, but how
real
> a threat is it for most businesses?
>
> If I am looking for data on a particular company I'll go to the company,
not
> try to scan the internet for their packets.
>
> The only reason I am pursuing these messages is because I believe these
> reactions are instilling a cult of fear into our IT departments, and in
the
> end business pressures are going to force us onto the web.  The risks will
> be taken and the IT people that act with fear and panic will be replaced.
> The internet vandals and thieves will be seen as a business risk just like
> the real world vandals and thieves.
>
> ---------------------------------------------------------
> Booth Martin   http://www.MartinVT.com
> Booth@MartinVT.com
> ---------------------------------------------------------
>
> -------Original Message-------
>
> From: midrange-l@midrange.com
> Date: Wednesday, December 04, 2002 02:47:50 PM
> To: midrange-l@midrange.com
> Subject: RE: Remote Access (Again)
>
> You're right... sort of... it doesn't have to be on your LAN or on
> your ISP's LAN... It can be anywhere that the packets get sent through.
> But you're right, it can't just be anywhere on the internet, only a
> machine along the packet route.
>
> Do a traceroute from the remote computer to the AS/400. Assuming that
> the ISPs firewalls allow traceroutes, each line of the output will be
> one gateway that the packets travel through.
>
> So, any computer on the same LAN with any of the listed gateways could
> be sniffing your packets.
>
> _______________________________________________
> This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing
list
> To post a message email: MIDRANGE-L@midrange.com
> To subscribe, unsubscribe, or change list options,
> visit: http://lists.midrange.com/cgi-bin/listinfo/midrange-l
> or email: MIDRANGE-L-request@midrange.com
> Before posting, please take a moment to review the archives
> at http://archive.midrange.com/midrange-l.
>
>




As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:
Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.