On the other hand, you just head over to the sysadmin lists and see the admins 
complaining about how much time is consumed supporting developers who get their 
machines compromised or otherwise borked. Putting unauthorised networks into an 
environment is a huge no-no in my book. Most developers do not have the skills 
or the knowledge to secure a network, let alone know what regulatory/audit 
requirements the business has. Then, if there is a compromise and corporate IP 
is stolen, customer information stolen etc. due to ingress via an unauthorized 
network, who is going to take the rap? 

-----Original Message-----
From: [email protected] [mailto:[email protected]] On 
Behalf Of Arjang Assadi
Sent: Friday, 18 November 2011 5:00 PM
To: ozDotNet
Subject: Re: [Friday OT] unstoppable force meets an immovable object,

On 18 November 2011 19:47, Les Hughes <[email protected]> wrote:
> Get a rouge box on the network with VMWare and set up a shadow 
> network. A wireless router can also help if the wired network is a 
> little discriminatory.
>
> Fight the power!

Brilliant!

That's voice of a true programmer being an unstoppable force talking,

Reply via email to