Would that equate to someone sending a complete router or firewall config with 
IP addresses and passwords to a public mailing list that is searchable via the 
Googles? :)

Carl Webster
Consultant and Citrix Technology Professional
http://www.CarlWebster.com



> -----Original Message-----
> From: Ben Scott [mailto:[email protected]]
> Sent: Thursday, September 08, 2011 1:52 PM
> To: NT System Admin Issues
> Subject: Re: Another high profile breach
> 
> On Thu, Sep 8, 2011 at 2:04 PM, Andrew S. Baker <[email protected]>
> wrote:
> > http://www.nytimes.com/2011/09/09/us/09breach.html
> 
>   So, basically, someone had an Excel question, and posted a sensitive
> spreadsheet to a public site in an effort to solicit assistance.
> 
>   "You can't fix stupid."
> 
> > Apparently from the future...
> 
>   It's already tomorrow in some parts of the world.  Although why the NYT
> would be on Asian time, I dunno.
> 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to