On Fri, 2010-02-26 at 13:51 -0700, Jeff Anderson wrote: > Perhaps a shift in discussion would be appropriate. What about the people who > are doing the scamming themselves? What drives them to do it? What gain are > they looking for? Why are they targeting university departments? Understanding > why these people do what they do may be beneficial in understanding why BYU > does monitoring in the first place.
You did a decent job of outlining the heart of the problem, namely: BYU has a tendency to implement well intentioned policies without regard for alternatives, or consequences. So why try to change the topic? I think we can all agree that BYU's network is constantly under attack. What we don't agree on is the appropriate response. -- "XML is like violence: if it doesn't solve your problem, you aren't using enough of it." - Chris Maden -------------------- BYU Unix Users Group http://uug.byu.edu/ The opinions expressed in this message are the responsibility of their author. They are not endorsed by BYU, the BYU CS Department or BYU-UUG. ___________________________________________________________________ List Info (unsubscribe here): http://uug.byu.edu/mailman/listinfo/uug-list
