Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
On Tue, Apr 10, 2001 at 01:10:27AM -0400, Ron Peterson wrote: > Chris Janicki wrote: > > > > Hey folks, you're not *paying* for a static IP address or even DNS > > service. What do you expect? For $30-$50/mo you're only supposed to be > > surfing the web, not serving it. > > The point is, they are creating an /artificial/ demand for premium > services by being jackasses about the basic services. Which they can > afford to do because they are a monopoly. Bingo. I would also make the point that when I signed up for MediaOne's service, they told me I had a constant connection, and ~1.5Mb/s downstream and (I can't remember but either) 300kbps or 512kbps upstream. What difference does it make whether I use that by downloading porn and e-mailing it to my friends, or by running a small personal web server? Do I get the bandwidth, or not? If I do, then who cares how I use it? Since they limit it via the CM, I can't exceed what they give me without illegally tampering with the equipment (or at least being guilty of theft of bandwitdth, for those who own their modems), at which point I can be prosecuted. So what's the big deal? P.S. sorry about the blank post... gnuserv wasn't running. :( -- "I have written this book partly to correct a mistake... A colleage of mine once told me that the world was full of bad security systems designed by people who read Applied Cryptograpy. "Since writing the book, I have made a living as a cryptography consultant: designing and analyzing security systems. To my initial surprise, I found that the weak points had nothing to do with the mathematics. They were in the hardware, the software, the networks, and the people. Beautiful pices of mathematics were made irrelevant through bad programming, a lousy operating system, or someone's bad password choice. I learned to look beyond the cryptography, at the entire system, to find weaknesses. I started repeating a couple of sentiments you'll find throughout this book: 'Security is a chain; it's only as secure as the weakest link.' 'Security is a process, not a product.'" --Bruce Schneier, from "Secrets & Lies" --------------------------------------------------- Derek Martin | Unix/Linux geek ddm at pizzashack.org | GnuPG Key ID: 0x81CFE75D Retrieve my public key at http://pgp.mit.edu - Subcription/unsubscription/info requests: send e-mail with "subscribe", "unsubscribe", or "info" on the first line of the message body to discuss-request at blu.org (Subject line is ignored).
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |