[147303] in North American Network Operators' Group
Re: [fyodor@insecure.org: C|Net Download.Com is now bundling Nmap
daemon@ATHENA.MIT.EDU (andrew.wallace)
Tue Dec 6 18:50:37 2011
Date: Tue, 6 Dec 2011 15:49:29 -0800 (PST)
From: "andrew.wallace" <andrew.wallace@rocketmail.com>
To: Bryan Fields <Bryan@bryanfields.net>
In-Reply-To: <4EDEA429.2000709@bryanfields.net>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Reply-To: "andrew.wallace" <andrew.wallace@rocketmail.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
A trojan can be used for good if in the right hands as a remote access tool=
for business use.=0A=0A=0AAndrew=0A=0A=0A________________________________=
=0A From: Bryan Fields <Bryan@bryanfields.net>=0ATo: "nanog@nanog.org" <nan=
og@nanog.org> =0ASent: Tuesday, December 6, 2011 11:24 PM=0ASubject: Re: [f=
yodor@insecure.org: C|Net Download.Com is now bundling Nmap with malware!]=
=0A =0AOn 12/6/2011 13:30, andrew.wallace wrote:=0A> It could be argued tha=
t Nmap is malware, and such software has already been called to be made ill=
egal.=0A> =0A> If I was Cnet, I would stop distributing his software altoge=
ther.=0A> =0A> Link: http://nmap.org/book/legal-issues.html=0A=0AIf this is=
not trolling and you actually believe this, just wow.....=0A=0ANmap is jus=
t a tool, and any tool can be misused by people for criminal acts.=0AIt's r=
eally no different than a gun in that regard.=A0 Both are incredibly=0Ausef=
ul things in the right hands, mere tools to further security.=A0 However in=
=0Athe wrong hands they can be used to commit crimes and break other people=
s=0Asecurity.=0A=0A-- =0ABryan Fields=0A=0A727-409-1194 - Voice=0A727-214-2=
508 - Fax=0Ahttp://bryanfields.net