In a truly stupid act on my part I answered the phone when someone called and I 
got saddled with seeing if I can dream up a elementary class in system 
forensics to give to my users (brilliant researchers who don't have a keen 
grasp on the basics like that an IP packet can be spoofed to look like it came 
from inside the firewall.)

I am familiar enough to know what I don't know and to try and err on the side 
of caution. (Not to mention that I'm still learning lots.)

I figured I'd ask this august group if anyone had any pointers on such things. 
If I have to do it myself, I will but I can't imagine that I'm the first one to 
tread this road (nor the best qualified.)

Anyone want to offer suggestions?

If requested I'll try to summarize for the group.

Thanks for the soapbox. :)
-- 
  << MCT >> Michael C Tiernan
  http://www.linkedin.com/in/mtiernan
_______________________________________________
Discuss mailing list
Discuss@lopsa.org
http://lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to