Would that equate to someone sending a complete router or firewall config with IP addresses and passwords to a public mailing list that is searchable via the Googles? :)
Carl Webster Consultant and Citrix Technology Professional http://www.CarlWebster.com > -----Original Message----- > From: Ben Scott [mailto:[email protected]] > Sent: Thursday, September 08, 2011 1:52 PM > To: NT System Admin Issues > Subject: Re: Another high profile breach > > On Thu, Sep 8, 2011 at 2:04 PM, Andrew S. Baker <[email protected]> > wrote: > > http://www.nytimes.com/2011/09/09/us/09breach.html > > So, basically, someone had an Excel question, and posted a sensitive > spreadsheet to a public site in an effort to solicit assistance. > > "You can't fix stupid." > > > Apparently from the future... > > It's already tomorrow in some parts of the world. Although why the NYT > would be on Asian time, I dunno. > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
