May I remind everybody that the purpose of this list is to share
information. What you do with this information is up to you (more or less).
If you use it as a blacklist: fine, I hope you know what you are doing...

On Fri, Aug 29, 2008 at 10:09 AM, <[EMAIL PROTECTED]> wrote:

>
> >Tell me how this works for a large site that has one piece of malware!
> badhost.com contains every wiki ever written and cause badguys.com slipped
> on >SQL trick in and redirect then we should block everything in
> badhost.com.  Does not work this way in an edu domain, somebody will cry
> academic >freedom and heads will roll.
>
> >blacklists have never been a solution! Censorship is just Censorship.
>
> All depends on your situation.  Makes sense that blacklisting isn't a good
> option for .edu but in the business environment it works quite well.  I have
> an obligation to block malicious crap from users in my environment.  If you
> want to call that censoring knock yourself out.  I call it protecting.  The
> example you give is also an extreme which, fortunately, doesn't happen a
> lot.  I would definitely handle that one differently.  I don't have to use
> blacklisting for everything - just where it makes sense.  Extremes have to
> be handled on a case by case basis.  If you're only going to use a solution
> that works for everything then you're going to be looking for awhile cause
> despite endless vendor claims I've yet to see a one-stop solution....
> _______________________________________________
> botnets@, the public's dumping ground for maliciousness
> All list and server information are public and available to law enforcement
> upon request.
> http://www.whitestar.linuxbox.org/mailman/listinfo/botnets
>
>
_______________________________________________
botnets@, the public's dumping ground for maliciousness
All list and server information are public and available to law enforcement 
upon request.
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets

Reply via email to