Free Republic
Browse · Search
General/Chat
Topics · Post Article


1 posted on 04/21/2021 5:33:31 PM PDT by SeekAndFind
[ Post Reply | Private Reply | View Replies ]


Flaw or invitation?


2 posted on 04/21/2021 5:35:25 PM PDT by Gene Eric (Don't be a statist!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: SeekAndFind

Much of the problem is the IT guys constantly wanting a new box, a new vendor.

Cisco is proven and the most secure.

And when a problem arises they can have a patch ready in 24hrs, with an army onsite to fix it.

Why that is not more highly valued is beyond me.


3 posted on 04/21/2021 5:38:55 PM PDT by Mariner (War Criminal #18)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce; dayglored; Whenifhow; null and void; aragorn; EnigmaticAnomaly; kalee; Kale; ...

p


5 posted on 04/21/2021 6:03:30 PM PDT by bitt (People who wonder if the glass is half empty or half full miss the point. The glass is refillable.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: SeekAndFind; rdb3; JosephW; martin_fierro; Still Thinking; zeugma; Vinnie; ironman; Egon; raybbr; ..

6 posted on 04/21/2021 6:06:38 PM PDT by ShadowAce (Linux - The Ultimate Windows Service Pack )
[ Post Reply | Private Reply | To 1 | View Replies ]

To: SeekAndFind
https://redmondmag.com/articles/2021/04/21/pulse-connect-critical-vulnerability.aspx

All your data are belong to China.

7 posted on 04/21/2021 6:21:29 PM PDT by TChad (The MSM, having nuked its own credibility, is now bombing the rubble.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: SeekAndFind

I am a retired sysadmin, who worked, primarily on US Army networks, managing servers, remotely. I never had any issues, I believe, because the older guard were competent sysadmins. I would do simple things, like create a fake root account, that could only access parts of hard drives which contained misinformation. Typically, my root accounts were usernamed: “guest” or some variation thereof. No access was allowed into my servers, unless it came from specific IP addresses, no access was allowed unless the IP address matched the MAC address. All traffic was encrypted with pre-shared keys, that were changed each day. A honey pot was always used on the network segment, as was various intrusion detection hardware devices. There were certain systems which needed better security, and these were maintained in an RF proof room, disconnected from the external world. All of our software was written “in-house” and there were no opportunities for vulnerabilities to be introduced, either accidentally, or deliberately, as any software that was written, was passed around among a very brilliant group of coders, who tried to hack it.

We had issues with the Chinese, but we kept them at bay, and understood the malevolent intentions that China has towards the US. DoD recruited the best and brightest, and none were anything but born and raised American. Since we have opened admission to our best CS schools to anyone from any country, they now have some of the best and brightest minds working to gain access. What did Academia think would happen by allowing 85% of their IT students to be Chinese?


10 posted on 04/21/2021 6:50:52 PM PDT by krogers58
[ Post Reply | Private Reply | To 1 | View Replies ]

To: SeekAndFind

can we blow them up now?

can we blow them up now?

can we blow them up now?


11 posted on 04/21/2021 6:52:18 PM PDT by Pollard ( )
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson