On Mon, 26 Jul 1999, Paul D. Robertson wrote:

> > network, effectively there is no way to define what is permissive and what
> > isn't. Therefore I do not see how you can call it "just" to punish someone
> > for doing it.  Especially since the cost to the scanee is nil. There needs
> > to be more. That's the bottom line to my argument.
> 
> The same argument could be used for telnet.  How do I know that nobody's
> set up a root account for me to use on their system until I've tried to
> access it?  Obviously, your line of reasoning doesn't hold well.

Nah, it isn't obvious.  I think you have some valid points but I still
disagree with you and so do lots of people.  Lets leave it at that.

--
Derek D. Martin           |  UNIX System Administrator
[EMAIL PROTECTED] |  [EMAIL PROTECTED]

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to