On Fri, 2010-02-26 at 13:51 -0700, Jeff Anderson wrote:
> Perhaps a shift in discussion would be appropriate. What about the people who
> are doing the scamming themselves? What drives them to do it? What gain are
> they looking for? Why are they targeting university departments? Understanding
> why these people do what they do may be beneficial in understanding why BYU
> does monitoring in the first place.

You did a decent job of outlining the heart of the problem, namely: BYU
has a tendency to implement well intentioned policies without regard for
alternatives, or consequences.

So why try to change the topic? I think we can all agree that BYU's
network is constantly under attack. What we don't agree on is the
appropriate response.

-- 
"XML is like violence: if it doesn't solve your problem, you aren't
using enough of it." - Chris Maden

--------------------
BYU Unix Users Group 
http://uug.byu.edu/ 

The opinions expressed in this message are the responsibility of their
author.  They are not endorsed by BYU, the BYU CS Department or BYU-UUG. 
___________________________________________________________________
List Info (unsubscribe here): http://uug.byu.edu/mailman/listinfo/uug-list

Reply via email to