On Mon, 2003-07-14 at 19:58, Tim Fournet wrote: > No, but If Cox is running some sort of NIDS, it doesn't need to do port > scans to identify open server ports. It can sniff the traffic going > to/from that port and identify it as an open server port, without ever > having to generate any packets of its own.
Poring over NIDS logs is pretty cumbersome over 1000s of addresses. I don't think Cox, or any other cable/DSL provider, are all that interested in going after folks running small-time local services. It's only when you do something else (ie. high bandwidth utilization) that potentially affects a number of other customers that would cause you to get into any real trouble. Cox can't afford to micromanage their network and go after every single person who might be deliberately running a publically accessible HTTPD instance. they've got bigger fish to fry. > -Tim > > > _______________________________________________ > General mailing list > [email protected] > http://brlug.net/mailman/listinfo/general_brlug.net
