[TriLUG] How not to run a network
Dan Monjar
dan at daijin.dissimulo.com
Wed Feb 16 10:29:18 EST 2005
William Sutton wrote:
> The points are:
> - If I can rename it anyway, then all that does is provide a slightly
> higher barrier to the stupidity level, meaning I can still send some luser
> a file labeled "your program.dat", tell them that it is useful in some way
> or other, and have them wipe out their system.
> - Likewise, it makes it a serious pain in my backside to send them
> legitimate programs (the more so since the IS folks took away IM file
> transfer).
>
> In other words, it puts a crimp in my ability to do my job and doesn't (as
> far as I can analyze the situation) do anything beyond stop Outlook from
> being stupid. Frankly that's not a sufficient reason to me.
>
> Of course the fact that I have to use Windows to do UNIX development work
> is a whole other sore point...
>
> I should also like to point out that can/can't and will/won't are very
> different things. I agree that "can't" is probably indicative that
> someone shouldn't be using a computer. "won't" is debatable. "doesn't
> want to" is a whole other option that you left out in what sounded like a
> targeted attack :)
>
no, certainly not targeted at you. Apologies if it seemed so.
The policy won't stopped a "targeted" attack. If I trust you and you
abuse that trust by sending me something bad then I am screwed. But the
policy does stop the millions of messages being spewed out by infected
machines.
I honestly cannot see the "serious pain" aspect of this. Copy prog.exe
to prog.exx and mail it to me. When I detach the file I do a save as to
prog.exe. where's the pain?
--
Dan Monjar
More information about the TriLUG
mailing list