From: Howard C. Berkowitz (hcb@gettcomm.com)
Date: Sun Apr 25 2004 - 01:20:47 GMT-3
At 5:52 AM +0200 4/25/04, Erlend Ringstad wrote:
> > access-list 100 deny ip 14.2.6.0 0.0.0.255 any log
>[snip alotofcrap]
>
>log? nice timekiller. seriousely, who the heck cares to LOG spoofed
>packets?
Quite likely anyone who wants to look for patterns, or correlations
with other streams in the attempt to track down distributed denial of
service. Serious log analysis requires software to analyze -- if you
are thinking of the labor involved in manual analysis.
Accountability, or the ability to associate actions with actors, is
probably the most fundamental axiom of computer and network security.
>
>"Router Security Configuration Guide published by the System and Network
>Attack Center"
>0wned the "National Security Agency" can suck my and Eric Cartmans
>balls!
>
Find a way to express your views in more appropriate language, both
grammatical and professional. Might I ask your qualifications in
security vis-a-vis the National Computer Security Center? IIRC, all
the NSA/NCSC guides are signed by the authors; they aren't just vague
bureaucratic documents.
Howard Berkowitz
Member, Groupstudy Moderator Team
This archive was generated by hypermail 2.1.4 : Mon May 03 2004 - 19:48:55 GMT-3