That doesnt actually equate to a network based intrusion at all.  You
cant simply see through a port and identify valuable data on the other
side.  An intrusion still has to take place.

--
ME2



On Fri, Feb 20, 2009 at 11:58 AM, Eric Brouwer <[email protected]> wrote:
> Actually, your shade example is a good one.  Your closed shades would stop
> the random, wanna be burglar from taking a chance on breaking into your
> house, and finding nothing.  They can't see that you have "stuff" through
> your windows.  They just want quick cash, so they walk next door and see
> your neighbors wallet with cash sticking out on his table through the
> window.  They break in his house, and take the easy, visible cash.
>
> On Feb 20, 2009, at 11:40 AM, Micheal Espinola Jr wrote:
>
>> My final rebuttal is this:  There is no value in an aspect of security
>> or security process that can not be quantified.  To do so is therefor
>> meaningless, and therefore has no value - other than some human oddity
>> that makes you personally feel good about doing it.
>>
>> Im going to go pull the shades down on all my windows and pretend
>> there are no bad guys outside.  :-)
>>
>> --
>> ME2
>>
>>
>>
>> On Fri, Feb 20, 2009 at 10:57 AM, Jonathan Link <[email protected]>
>> wrote:
>>>
>>> I will stipulate that security only by obscurity is false security.  But
>>> likely to remain unconvinced that there is no role or value for obscurity
>>> in
>>> the security process.
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
>
> Eric Brouwer
> IT Manager
> www.forestpost.com
> [email protected]
> 248.855.4333
>
>
>
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to