In that case, I agree with you.
The thing is, it is easier to circumvent a firewall/ids/whatever than to
buy a fw1 that costs 18k$ and who knows
how much you will need to pay for the unlimited version if you have a
large organization.
anyway, I think that the corporates are going to loose that battle as
long as the bandwidth is going to rise,
and the hardware to inspect the information is going to skyrocket.
Enter Linux, a moderate solution to a big problem. better Linux than
nothing. It does come with costs,
but as all polls suggest it is negligible compared to the commercial
enterprise solutions out there.(non-linux)

well, I think this thread reached its limit.

* - * - *
Tzahi Fadida
[EMAIL PROTECTED]
Technion Email: [EMAIL PROTECTED]
My Cool Site: HTTP://WWW.My2Nis.Com
* - * - * - * - * - * - * - * - * - *

WARNING TO SPAMMERS:  see at
http://members.lycos.co.uk/my2nis/spamwarning.html

> -----Original Message-----
> From: Shachar Shemesh [mailto:linuxil@;consumer.org.il]
> Sent: Thursday, October 31, 2002 2:22 PM
> To: [EMAIL PROTECTED]
> Cc: [EMAIL PROTECTED]
> Subject: Re: upcoming java ssh2?
>
>
>
>
> Tzahi Fadida wrote:
>
> >i disagree, since as long that there will be free access to internet
> >nodes, i.e: unlike some cellular companies that provide WAP services
> >do(they only allow you to surf their internal wap pages)
> >
> >you can find a way to access these resources, since inside the
> >definition of "allow a b c" you allow side effects to
> infiltrate which
> >is at the heart of the internet technology makeup
> >
> >
> Forgive me for erasing your example. I think you have
> misunderstood what
> I said
>
> If I understand your point correctly, you are trying to say that any
> given policy, assuming it is slightly permissive, can be used
> to relay
> ANY information, assuming cooporation from both sides of the
> communication. With that point I agree
>
> My point, however, is that any *given* method of overloading one
> (presumably unwanted) method of communication over another
> (presumably
> wanted, or at least allowed) can be detected on the way,
> assuming enough
> resources (unless encryption is used with the legitimate method, in
> which case all bets are off)
>
> Now, if you look at the two points raised, you can easily see
> that for
> large deployment P2P clients and instant messangers, there is
> a race. It
> consist of "security" technologies adapting to a given protol
> to block
> it, "bypass" technologies bypass to that specific enhanced
> control, to
> bypass it, and go back to step one. This is what I called in
> my previous
> email "the race is on"
>
>                     Shachar
>
>
>
>
>



=================================================================
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]

Reply via email to