In a truly stupid act on my part I answered the phone when someone called and I got saddled with seeing if I can dream up a elementary class in system forensics to give to my users (brilliant researchers who don't have a keen grasp on the basics like that an IP packet can be spoofed to look like it came from inside the firewall.)
I am familiar enough to know what I don't know and to try and err on the side of caution. (Not to mention that I'm still learning lots.) I figured I'd ask this august group if anyone had any pointers on such things. If I have to do it myself, I will but I can't imagine that I'm the first one to tread this road (nor the best qualified.) Anyone want to offer suggestions? If requested I'll try to summarize for the group. Thanks for the soapbox. :) -- << MCT >> Michael C Tiernan http://www.linkedin.com/in/mtiernan _______________________________________________ Discuss mailing list Discuss@lopsa.org http://lopsa.org/cgi-bin/mailman/listinfo/discuss This list provided by the League of Professional System Administrators http://lopsa.org/