[17] in Intrusion Detection Systems

home help back first fref pref prev next nref lref last post

Introduction

daemon@ATHENA.MIT.EDU (jim_bostwick@cargill.com)
Thu Mar 30 20:11:56 1995

From: jim_bostwick@cargill.com
To: ids@uow.edu.au
Date: Thu, 30 Mar 95 14:27:07 -0600
Reply-To: ids@uow.edu.au


Finally saw something OTHER than intros float by, so time to de-lurk, I guess.

I built and manage the Internet firewall for my company. My background is 
in process control -> networking -> security (more or less that order). 
Given that some 80+% of my internal users still can't spell TCP (but can still
spell SNA ;^), my keen interest in network security  - and hence in this list - 
should be obvious. 

When not being a bit-head, I enjoy restoring antique farm machinery, using it
on a tiny hobby-farm, and helping (?) my kids to grow up. If only my
six-year-old weren't so good at DOOM...

So that there's more than one more bio here -
IMHO the SATAN hysteria is quite amusing, but thoroughly misplaced. 
I've pulled the 'doc' demo and it appears to be a VERY nicely constructed tool 
for identifying OLD, WELL-KNOWN, and pretty BASIC vulnerabilities in your 
network. So aside from the name, what's the fuss? Media getting tired of the
OJ trial? 

{ there! that ought to get something going...}

Jim Bostwick

home help back first fref pref prev next nref lref last post