I'd not allow it, I'd make them find another menas of acheiving their
objective<s>.

Thanks,

Ron DuFresne

On Thu, 20 Dec 2001, Steven Bonici wrote:

> I should have explained a little better... Actually it is a software vendor
> using the services of WebEx to take control of a server for support issues
> when needed.  
> 
> -----Original Message-----
> From: Ron DuFresne [mailto:[EMAIL PROTECTED]]
> Sent: Thursday, December 20, 2001 1:50 PM
> To: Steven Pierce
> Cc: Steven Bonici; [EMAIL PROTECTED]
> Subject: Re: Taking control of ones machine
> 
> 
> 
> Steven,
> 
> I can't answer that for you, you should have more info on the needs of
> this vendor then I.  Why did they 'claim' to require this level of access?
> What are they trying to 'do for you'?  I'd certainly be loath to allow any
> vendor this level of access to my systems, especially if this is being
> done across the Internet, but even if they were in house at my keyboard,
> I'd be over their shoulder the whole time <smile>.  Far more is done out
> of stupidity of vendor consultants then out of any will do to harm in
> cases like this.  
> 
> Thanks,
> 
> Ron DuFresne
> 
> On Thu, 20 Dec 2001, Steven Pierce wrote:
> 
> > 
> > Ron,
> > 
> > I agree 100%.  I would be asking WHY are they in need of this
> > access?  If they need access to a server, I would set up one that
> > does not give them ANY access to my network.  Then I can post
> > information on it if needed.  Also give them a log in not full access,
> > that way (Company) keeps ROOT access...
> > 
> > S
> > 
> > *********** REPLY SEPARATOR  ***********
> > 
> > On 12/20/2001 at 12:39 PM Ron DuFresne wrote:
> > 
> > >On Thu, 20 Dec 2001, Steven Bonici wrote:
> > >
> > >   [SNIP]
> > >
> > >> 
> > >> I haven't contacted them yet, I thought I would ask here first.  Is
> there
> > >> any documentation or white papers into how this actually works and what
> > >can
> > >> be done to protect the machine?  Does anyone have any insight into
> > >WebEx?  I
> > >> am really curious as to how easy this is.  I know once you go to the
> > >WebEx
> > >> web site you need to agree and "allow" someone to actually connect, but
> > >it
> > >> just seems way too easy.
> > >> 
> > >
> > >
> > >Just don't install their trojan <smile>.  This is basically what you are
> > >doing, installing their application that simulates what many trojans do,
> > >give unlimited access to the system.
> > >
> > >Thanks,
> > >
> > >Ron DuFresne
> > >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> > >"Cutting the space budget really restores my faith in humanity.  It
> > >eliminates dreams, goals, and ideals and lets us get straight to the
> > >business of hate, debauchery, and self-annihilation." -- Johnny Hart
> > >   ***testing, only testing, and damn good at it too!***
> > >
> > >OK, so you're a Ph.D.  Just don't touch anything.
> > >
> > >_______________________________________________
> > >Firewalls mailing list
> > >[EMAIL PROTECTED]
> > >http://lists.gnac.net/mailman/listinfo/firewalls
> > 
> > 
> > 
> 
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> "Cutting the space budget really restores my faith in humanity.  It
> eliminates dreams, goals, and ideals and lets us get straight to the
> business of hate, debauchery, and self-annihilation." -- Johnny Hart
>       ***testing, only testing, and damn good at it too!***
> 
> OK, so you're a Ph.D.  Just don't touch anything.
> 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"Cutting the space budget really restores my faith in humanity.  It
eliminates dreams, goals, and ideals and lets us get straight to the
business of hate, debauchery, and self-annihilation." -- Johnny Hart
        ***testing, only testing, and damn good at it too!***

OK, so you're a Ph.D.  Just don't touch anything.

_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls

Reply via email to