Agreed....I would never allow an outside service direct access to my systems
either (it would just leave one more potential point-of-entry). However,
from a business-model perspective I think the number of managers/admins who
would is enough to support a few businesses providing this type of service.
The simple fact that some small companies exist which are making their $ by
providing remote backup services (which requires direct access to a
company's most sensitive data...or why would they want it backed up?) shows
that people are willing to give keys to their gates to someone to come in
and do some work for them.
Since many small / medium sized business don't actually run their own
webservers but instead use a hosting service, then it may even become a more
viable business model. Those companies already use remote methods to update
and maintain their websites. They would simply provide the website
monitoring firm limited access to that pipe (read-only). Hosting companies
themselves might be able to make a little extra $ by offering a side service
to provide this same monitoring & recovery. As mentioned, it can really be
scripted so would require little ongoing effort, and the host service
already has access to the file systems.
-Larry
-----Original Message-----
From: Ray Cote [SMTP:[EMAIL PROTECTED]]
Sent: Wednesday, May 23, 2001 10:52 AM
Subject: Re: Monitoring Website Defacements
<snip>
Actually, to do this properly, you'd really need access to their
directories for the monitoring.
Web pages change dynamically all the time -- adverts change, time
display, local weather, etc., etc.
Would want to see the raw .HTML files.
Of course, not every has raw .HTML files (Zope, Manila, etc.).
This sounds like an interesting product for tracking, but I sure
wouldn't open my site up to any external service.
Ray
**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************