Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Ashcroft's Anti-Terrorism Act may convict us all ...



Ron writes:
| I certainly wouldn't advocate trying to crack .mil boxes in any case.  But
| I would surmise that the fact script kiddies and their ilk /do/ attempt
| such hijinks helps keep the sysadmins on their toes.  If no-one even dares
| to poke at these machines, I can imagine an onerous degree of complacency
| setting in - leaving .mil boxes just flapping in the breeze.  So when the
| /real/ terrorists want to strike, they'll have easy pickings.
|
| But what do I know?

It seems to me that you have  a  pretty  good  understanding  of  the
situation.   There is a long history of "shooting the messenger" when
the topic is computer security.

Of course, the media do like to quote military sources who claim that
their systems get hit millions of times per day. I've often suspected
that they are counting pings as "attacks". I haven't seen any details
that would convince me otherwise.

-
Subcription/unsubscription/info requests: send e-mail with
"subscribe", "unsubscribe", or "info" on the first line of the
message body to discuss-request at blu.org (Subject line is ignored).




BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org