Firewall Wizards mailing list archives
RE: Killing Napster and beyond...
From: "Graham, Randy (RAW) " <RAW () y12 doe gov>
Date: Mon, 23 Oct 2000 10:25:38 -0400
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Until someone needs to send something from A to B, but they haven't quite finished the project and it is time to go home for the week-end. So, they send it to point C (at home) in the clear, finish it up on Saturday, and then send it on to network B Saturday night (again, in the clear). But I like your analogy, because I think it gets to the intended point of the "Technology should not be used to manage people's behavior" statement. I think the original poster meant the technology shoud not be used exclusively. In other words, just blocking napster (or just about any other service) via a firewall is not sufficient, as users can work around your blocks somehow or another (we all know about tunnelling everything in the world over HTTP). In addition to a technological measure, there needs to be a company policy on usage that states "Protocol X" is not to be used on the network. Sure, you try to block it with the firewall, but you have the company policy to fall back to when people start trying to work around it. Similarly, the earlier statement about traffic lights being a technology to manage people's behavior doesn't quite stand up. There is nothing inherent in a traffic light that forces me to stop when it is red. It is the technology in conjunction with the policy (actually, the law) that tells me I am supposed to stop at a red light that makes me stop. People still work around the technology, but there are penalties for doing so if they get caught. Yes, the technology is there to limit things, but without the policies in place, people can just find a way to work around the tehnological limitation and continue there fun unmolested. I really think the original poster meant "Technology *ALONE* should not be used to manage people's behavior." Randy Graham - -----Original Message----- From: jcintron () imsidc com [SMTP:jcintron () imsidc com] Sent: Friday, October 20, 2000 4:10 PM To: jjm () jkintl com; Brad.VanOrden () navius com Cc: firewall-wizards () nfr com Subject: RE: [fw-wiz] Killing Napster and beyond... I'll go a step further...
Technology should not be used to manage people's behavior.
In a perfect world I would agree with this statement, but look at this way. People want devices to help them control what their kids should and shouldn't watch on TV, and for government to monitor movies, music and the alike. I don't really like to use technology to modify ppls. behavior, but when you deal with ppl. that the only way they respond is by the use of force (technology in this case) what choices you have. Also there are occasions in which you HAVE to use technology for this. Simple example... No data going from network A to network B can be sent in the clear. Everyone knows there will be an idiot that will send data in the clear and that will be the end. Solution, install an encrypted link between the 2 networks and you are done. just my $.02 +------------------------------------------------------------ | Jose J. Cintron - <jcintron () imsidc com> | | Integrated Management Services, Inc. | 2101 Wilson Boulevard, Suite 916 | Arlington, VA 22201 | | Phone: 703.528.0334 x323 | FAX: 703.528.3477 | Web: http://www.imsidc.com/ +------------------------------------------------------------ - -----Original Message----- From: John McDermott [mailto:jjm () jkintl com] Sent: Thursday, October 19, 2000 17:52 To: Brad Van Orden Cc: firewall-wizards () nfr com Subject: Re: [fw-wiz] Killing Napster and beyond...
Technology should not be used to manage people's behavior.
While this view has some merit, it also should not be universal. For instance, in those environments where static passwords are required, the use of tools help ensure compliance with "strong" password rules is a Good Thing. I would say that, in general, using technology to implement security policy wherever possile is a good idea. It helps reduce mistakes and may even prevent malicous behavior. - --john - -- John McDermott, Writer and Consultant J-K International, Ltd. V +1 505/377-6293 F +1 505/377-6313 jjm () jkintl com _______________________________________________ firewall-wizards mailing list firewall-wizards () nfr com http://www.nfr.com/mailman/listinfo/firewall-wizards _______________________________________________ firewall-wizards mailing list firewall-wizards () nfr com http://www.nfr.com/mailman/listinfo/firewall-wizards -----BEGIN PGP SIGNATURE----- Version: PGP Personal Privacy 6.5.3 iQA/AwUBOfRKuhmX7SWIy+ClEQJO9QCfeuUQp3qg//gZ5fHicdOnnl0EbMIAoJJe EPLBoTyJ6b/T3TkIn3GmaSjp =3nSx -----END PGP SIGNATURE----- _______________________________________________ firewall-wizards mailing list firewall-wizards () nfr com http://www.nfr.com/mailman/listinfo/firewall-wizards
Current thread:
- RE: Killing Napster and beyond..., (continued)
- RE: Killing Napster and beyond... Dave Costello (Oct 20)
- RE: Killing Napster and beyond... Harris, Tim (Oct 20)
- RE: Reducing Napster and beyond... Jonn Martell (Oct 23)
- RE: Killing Napster and beyond... Delmer Harris (Oct 20)
- Re: Killing Napster and beyond... Vern Paxson (Oct 20)
- Re: Killing Napster and beyond... Brad Van Orden (Oct 20)
- RE: Killing Napster and beyond... jcintron (Oct 23)
- RE: Killing Napster and beyond... agoldney (Oct 24)
- RE: Killing Napster and beyond... Barry Dykes (Oct 24)
- RE: Killing Napster and beyond... agoldney (Oct 24)
- RE: Killing Napster and beyond... Graham, Randy (RAW) (Oct 24)