[55305] in North American Network Operators' Group
Re: Anybody doing a "Code Green" for 1434?
daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Mon Jan 27 01:04:20 2003
To: "Stewart, William C (Bill), SALES" <billstewart@att.com>
Cc: nanog@trapdoor.merit.edu
In-Reply-To: Your message of "Mon, 27 Jan 2003 00:35:19 EST."
<1BEAD1ECDAF2EB4B865404186363827F084DB4C4@ocsrs03.ugd.att.com>
From: Valdis.Kletnieks@vt.edu
Date: Mon, 27 Jan 2003 01:03:10 -0500
Errors-To: owner-nanog-outgoing@merit.edu
--==_Exmh_-2109428228P
Content-Type: text/plain; charset=us-ascii
On Mon, 27 Jan 2003 00:35:19 EST, "Stewart, William C (Bill), SALES" <billstewart@att.com> said:
> Even if people don't want to run it on the open internet,
> due to concerns about appropriateness of reverse hacking,
> it might be useful for inside-the-firewall cleanup
> for corporations that get hit.
It's inappropriate inside a corporation for the same reason it's not
right for the open internet.
But hey, if you don't wanna get paid this time around because somebody
installed a patch that rebooted the payroll server and it didn't come back..
Well.. it's your paycheck, not mine.
I mean.. really. if a company needs a "code green" tool to clean up after this
for their own internal stuff, the right answer isn't code green, the right
answer is outsourcing their IT to someplace that has a clue.
--
Valdis Kletnieks
Computer Systems Senior Engineer
Virginia Tech
--==_Exmh_-2109428228P
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
Comment: Exmh version 2.5 07/13/2001
iD8DBQE+NMuecC3lWbTT17ARAjLLAKCesSAvikD37F04cz0jG+dGjWDz+wCgrjvt
b0YLScVH2cuibjDU9T0CXIU=
=Ys19
-----END PGP SIGNATURE-----
--==_Exmh_-2109428228P--