Quote:
Originally Posted by badshot
Add another to the list (Netherlands too) who blocks/drops countries...Er um that also includes 10.x.x.x 192.168.x.x etc. cause they like spoofing those too.
Lets not forget good IPS signatures. Most of the time just to save bandwidth and firewall cpu cycles.
|
Ditto. To nitpick, a static packet filtering router at the border is faster/more efficient for the task than a firewall/IPS as most routers implement layer 3 in hardware(ASIC) whereas firewalls and IDS/IPS appliances implement it in software.
Quote:
Originally Posted by badshot
Certain OS's and configurations as well as programmers/languages make this more of an issue by the way. The later is generally a result of the language protecting the programmer from the OS or forcing them to build stuff in a modular fashion, resulting in the buffers, stacks, and/or heaps being exploited.
Included here is the sheep syndrome...lets all use the same stuff!
|
Sadly, politics and philosophy made it into the "infallible" computer. The (primary) two lines of thinking were, a) the programmer is responsible for writing good code(which is true), hence why implement any bounds checking or "idiot-proof" functions. or b) people are sheep, will write bad code, so while we will tell everyone not to rely on safe/catch-all functionality, we will silently improve it to the point that they can mitigate %95 of the threats to it(Microsofts Request filter in .NET is an execellent example of this).
Quote:
Originally Posted by badshot
Then there is the popular piggyback method from users home computers into the protected ones.
Makes you wonder what idiot is responsible for the firewalls at Uncle Sam or enforcing guidelines in relation to VPN and other such tunneling from home. Hardware keys are useless if you've caught an STD (or CTD?), use the same IP, to name only a couple.
Its just been happening since the 90's guys...did I say idiots!
China thanks you for the new Stealth Technology they have...
K, I'll go have a beer now.
|
Securing remote access = securing the human, a.k.a layer 8. Just remember that outside the world of NOR/NAND gates...1+1=3....