On Mon, 26 Jul 1999, Paul D. Robertson wrote:
> > network, effectively there is no way to define what is permissive and what
> > isn't. Therefore I do not see how you can call it "just" to punish someone
> > for doing it. Especially since the cost to the scanee is nil. There needs
> > to be more. That's the bottom line to my argument.
>
> The same argument could be used for telnet. How do I know that nobody's
> set up a root account for me to use on their system until I've tried to
> access it? Obviously, your line of reasoning doesn't hold well.
Nah, it isn't obvious. I think you have some valid points but I still
disagree with you and so do lots of people. Lets leave it at that.
--
Derek D. Martin | UNIX System Administrator
[EMAIL PROTECTED] | [EMAIL PROTECTED]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]