On Feb 19, 2007, at 8:06 AM, <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> wrote:

And if the system designer is creative enough, then
this firewall thingy which is reputed to protect you from bad stuff,
would also download and install the latest patches to protect against
browser exploits. If this is all run on a separate CPU it can also do
some pretty in-depth inspection and do things like block .exe
attachements in email.

If we had some cheese, we could make a ham-and-cheese sandwich, if we had some ham.

;>

This discussion started out with an assertion that that security problem for general-purpose OS endpoints had been 'solved'. It in fact has not been solved for any reasonable degree of solved - there are basic layer-7 problems with the fundamentals such as HTTP (which to most users is 'the Internet), and while there are various efforts to attempt to mitigate these problems via the insertion of inspection/ removal by network devices, these efforts are in their infancy and also introduce other complexities which are corollaries of the canonical end-to-end principle (vs. the common misperception of what the end-to-end principle actually encompasses).

-----------------------------------------------------------------------
Roland Dobbins <[EMAIL PROTECTED]> // 408.527.6376 voice

          The telephone demands complete participation.

                      -- Marshall McLuhan

Reply via email to