@botman....
Don't put one half and not the other. To mention part, but not all of my
words in context.  It makes you look like you only partially learned to read
.

It was stated, "should be fired or reprimanded".

Which is normal corporate policy for minor security violations and
mishandling of those violations by employees of "most" companies I have ever
worked under contract for.

No, I've never had a system get breached beyond the routers on the 1st
layer/ring (buffer layer/gateway w/counter intrusion firmware), guess
because I use the right tools, and know my trade well enough to keep the
networks secure with no mishaps.

And unlike some people @ Valve, the companies I have contracts with have
PROSECUTED people that illegally attempt to misuse their networks.

I doubt they'll ever catch the hacker who got the hl2 files. Although his
route to/from info was there in the router traffic logs the whole time (why
I say it was leeked and not stolen). The hacker would have been served
within 30 days by most companies.

Like I said in an email to Gabe, and others during the theft/leek. Anyone
who left an OE installation vulnerable, either a) purposely left it like
that to let someone in, or b) "has no clue to what they are doing and should
be fired or reprimanded".  I am sure that little fiasco had some
repercussions.

And here we are a few months later, with another network security issue. So
yeah, I am sure the IT guy (is that you Adrian?) would WANT to do something
about it, since it is HIS/HER job that would be the first thing cut if
someone got infected through this list.
StealthMode


_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please visit:
http://list.valvesoftware.com/mailman/listinfo/hlcoders

Reply via email to