Originally posted by: acemcmac
Originally posted by: werk
Maybe you should quit whining here and figure out a way to "get your fvcking work done."
I did, I needed a file from my home server, got it via remote desktop and sent it off to the prof.
Been having problems with the FTP server I use as backup for the same purpose, so I was a little screwed there....
Originally posted by: spidey07
Originally posted by: acemcmac
Originally posted by: n0cmonkey
Originally posted by: acemcmac
It's against policy, that's enough of a reason.
No, it's not. I helped write this school's network administration policies before I got a better offer. They just think they know better what I want to do with the comptuer than I do and deleted "extraneous and confusing information." To this day, I am the only administrator on the network after hours and the one of the only people with the authority to reverse access suspensions on the residental network. I have never needed M$ administrator access and have never asked for it. This kind of stuff is just unbelieveable.
If you wrote the policies and did not ban remote desktop and similar software, you missed quite a bit. Bad policy bitch, bad.
If you have no servers that allow such a primative protocol to gain access to them, what in the hell are you vounerable to? Someone using their home computer to print to the computer on their desk? Someone uploading malicious files that your firewall should be intercepting? This traffic isn't even leaving the gateway.... it's packet shaped out... this is traveling across the lan strictly..... no reason at all for it to be blocked
oh please Mr. Network Security guru, explain to us how a firewall can stop malicous files or code?
Or for that matter malicous activity at all.
Is there any encryption on remote desktop at all? If Cisco has firmwares that, at swich level, can identify and remove common variants of worms etc, firewalls can be configured to provide the same basic security to primative remote sessions. Anything you are exposing yourself to by allowing remote desktop, you are already exposing yourself to by not doing a pat down search of every client looking for their thumbdrives or cdrom's....
Originally posted by: spidey07
Originally posted by: acemcmac
Originally posted by: n0cmonkey
Originally posted by: acemcmac
Originally posted by: n0cmonkey
Originally posted by: acemcmac
It's against policy, that's enough of a reason.
No, it's not. I helped write this school's network administration policies before I got a better offer. They just think they know better what I want to do with the comptuer than I do and deleted "extraneous and confusing information." To this day, I am the only administrator on the network after hours and the one of the only people with the authority to reverse access suspensions on the residental network. I have never needed M$ administrator access and have never asked for it. This kind of stuff is just unbelieveable.
If you wrote the policies and did not ban remote desktop and similar software, you missed quite a bit. Bad policy bitch, bad.
If you have no servers that allow such a primative protocol to gain access to them, what in the hell are you vounerable to? Someone using their home computer to print to the computer on their desk? Someone uploading malicious files that your firewall should be intercepting? This traffic isn't even leaving the gateway.... it's packet shaped out... this is traveling across the lan strictly..... no reason at all for it to be blocked
What isn't necessary, is bad.
Wrong. Again, that is the coorperate paradigm. In a corperation, IT is responsible to management and ownership. When IT does not accomidate them, they are useless and need to go. In education, IT is responsible to the faculty and students. When IT does not accomidate them, they are useless and need to go.
Wrong. IT is just another department that answers to the food chain. That food chain reports to owners. Ownsers report to auditors. It has nothing to do with students/faculty/employees, etc. Nothing whatsoever.
Develop and maintain highly effective, reliable, secure, and innovative information systems to support instructional, administrative and research functions.
Originally posted by: acemcmac
Originally posted by: spidey07
Originally posted by: acemcmac
Originally posted by: spidey07
Originally posted by: n0cmonkey
Originally posted by: acemcmac
It's against policy, that's enough of a reason.
No, it's not. I helped write this school's network administration policies before I got a better offer. They just think they know better what I want to do with the comptuer than I do and deleted "extraneous and confusing information." To this day, I am the only administrator on the network after hours and the one of the only people with the authority to reverse access suspensions on the residental network. I have never needed M$ administrator access and have never asked for it. This kind of stuff is just unbelieveable.
If you wrote the policies and did not ban remote desktop and similar software, you missed quite a bit. Bad policy bitch, bad.
yeah, I'm thinking he didn't take "network operations" 101.
I have yet to hear one good reason why it should be banned in an educational setting that you can't cover with other bases. You suck.
Its a remote control tool.
Good security policy as dictated in "network operations 101" is not allowed nor should it be. Ever been audited? It wasn't the evil sys admins call, it came from much higher up.
Oh NO, NOT AN EVIL REMOTE CONTROL TOOL :roll:. If you have a server that is voulnerable to an attack from a domestic remote control client, then you have bigger problems to worry about. I have had formal network security training, and security policies start at the servers. Client security should be considered invalaid just by leaving a human being alone with an ethernet jack.
Originally posted by: spidey07
Originally posted by: acemcmac
Originally posted by: werk
Maybe you should quit whining here and figure out a way to "get your fvcking work done."
I did, I needed a file from my home server, got it via remote desktop and sent it off to the prof.
Been having problems with the FTP server I use as backup for the same purpose, so I was a little screwed there....
Originally posted by: spidey07
Originally posted by: acemcmac
Originally posted by: n0cmonkey
Originally posted by: acemcmac
It's against policy, that's enough of a reason.
No, it's not. I helped write this school's network administration policies before I got a better offer. They just think they know better what I want to do with the comptuer than I do and deleted "extraneous and confusing information." To this day, I am the only administrator on the network after hours and the one of the only people with the authority to reverse access suspensions on the residental network. I have never needed M$ administrator access and have never asked for it. This kind of stuff is just unbelieveable.
If you wrote the policies and did not ban remote desktop and similar software, you missed quite a bit. Bad policy bitch, bad.
If you have no servers that allow such a primative protocol to gain access to them, what in the hell are you vounerable to? Someone using their home computer to print to the computer on their desk? Someone uploading malicious files that your firewall should be intercepting? This traffic isn't even leaving the gateway.... it's packet shaped out... this is traveling across the lan strictly..... no reason at all for it to be blocked
oh please Mr. Network Security guru, explain to us how a firewall can stop malicous files or code?
Or for that matter malicous activity at all.
Is there any encryption on remote desktop at all? If Cisco has firmwares that, at swich level, can identify and remove common variants of worms etc, firewalls can be configured to provide the same basic security to primative remote sessions. Anything you are exposing yourself to by allowing remote desktop, you are already exposing yourself to by not doing a pat down search of every client looking for their thumbdrives or cdrom's....
Layer 2-4 devices cannot inspect layer 7 traffic. Please explain how a firewall is to block malicous code.
Id also like to know how a layer 2 device (as you explained) can identify and remove a worm - given that you belive even a layer4 device can do it (which it can't)
Originally posted by: acemcmac
Originally posted by: spidey07
Originally posted by: acemcmac
Originally posted by: n0cmonkey
Originally posted by: acemcmac
Originally posted by: n0cmonkey
Originally posted by: acemcmac
It's against policy, that's enough of a reason.
No, it's not. I helped write this school's network administration policies before I got a better offer. They just think they know better what I want to do with the comptuer than I do and deleted "extraneous and confusing information." To this day, I am the only administrator on the network after hours and the one of the only people with the authority to reverse access suspensions on the residental network. I have never needed M$ administrator access and have never asked for it. This kind of stuff is just unbelieveable.
If you wrote the policies and did not ban remote desktop and similar software, you missed quite a bit. Bad policy bitch, bad.
If you have no servers that allow such a primative protocol to gain access to them, what in the hell are you vounerable to? Someone using their home computer to print to the computer on their desk? Someone uploading malicious files that your firewall should be intercepting? This traffic isn't even leaving the gateway.... it's packet shaped out... this is traveling across the lan strictly..... no reason at all for it to be blocked
What isn't necessary, is bad.
Wrong. Again, that is the coorperate paradigm. In a corperation, IT is responsible to management and ownership. When IT does not accomidate them, they are useless and need to go. In education, IT is responsible to the faculty and students. When IT does not accomidate them, they are useless and need to go.
Wrong. IT is just another department that answers to the food chain. That food chain reports to owners. Ownsers report to auditors. It has nothing to do with students/faculty/employees, etc. Nothing whatsoever.
College of DuPont, (first google hit) Office of Information Technology Mission Statement, 4th bullet
Develop and maintain highly effective, reliable, secure, and innovative information systems to support instructional, administrative and research functions.
You just got served
Originally posted by: acemcmac
Originally posted by: spidey07
Originally posted by: acemcmac
Originally posted by: n0cmonkey
Originally posted by: acemcmac
Originally posted by: n0cmonkey
Originally posted by: acemcmac
It's against policy, that's enough of a reason.
No, it's not. I helped write this school's network administration policies before I got a better offer. They just think they know better what I want to do with the comptuer than I do and deleted "extraneous and confusing information." To this day, I am the only administrator on the network after hours and the one of the only people with the authority to reverse access suspensions on the residental network. I have never needed M$ administrator access and have never asked for it. This kind of stuff is just unbelieveable.
If you wrote the policies and did not ban remote desktop and similar software, you missed quite a bit. Bad policy bitch, bad.
If you have no servers that allow such a primative protocol to gain access to them, what in the hell are you vounerable to? Someone using their home computer to print to the computer on their desk? Someone uploading malicious files that your firewall should be intercepting? This traffic isn't even leaving the gateway.... it's packet shaped out... this is traveling across the lan strictly..... no reason at all for it to be blocked
What isn't necessary, is bad.
Wrong. Again, that is the coorperate paradigm. In a corperation, IT is responsible to management and ownership. When IT does not accomidate them, they are useless and need to go. In education, IT is responsible to the faculty and students. When IT does not accomidate them, they are useless and need to go.
Wrong. IT is just another department that answers to the food chain. That food chain reports to owners. Ownsers report to auditors. It has nothing to do with students/faculty/employees, etc. Nothing whatsoever.
College of DuPont, (first google hit) Office of Information Technology Mission Statement, 4th bullet
Develop and maintain highly effective, reliable, secure, and innovative information systems to support instructional, administrative and research functions.
You just got served
Originally posted by: spidey07
Originally posted by: acemcmac
Originally posted by: spidey07
Originally posted by: acemcmac
Originally posted by: spidey07
Originally posted by: n0cmonkey
Originally posted by: acemcmac
It's against policy, that's enough of a reason.
No, it's not. I helped write this school's network administration policies before I got a better offer. They just think they know better what I want to do with the comptuer than I do and deleted "extraneous and confusing information." To this day, I am the only administrator on the network after hours and the one of the only people with the authority to reverse access suspensions on the residental network. I have never needed M$ administrator access and have never asked for it. This kind of stuff is just unbelieveable.
If you wrote the policies and did not ban remote desktop and similar software, you missed quite a bit. Bad policy bitch, bad.
yeah, I'm thinking he didn't take "network operations" 101.
I have yet to hear one good reason why it should be banned in an educational setting that you can't cover with other bases. You suck.
Its a remote control tool.
Good security policy as dictated in "network operations 101" is not allowed nor should it be. Ever been audited? It wasn't the evil sys admins call, it came from much higher up.
Oh NO, NOT AN EVIL REMOTE CONTROL TOOL :roll:. If you have a server that is voulnerable to an attack from a domestic remote control client, then you have bigger problems to worry about. I have had formal network security training, and security policies start at the servers. Client security should be considered invalaid just by leaving a human being alone with an ethernet jack.
And in your training you should have learned that basics....
Servers are easy to protect, the clients are not and is where most security actions should be focused.
Especially remote control tools....I mean c'mon dude. That is right up there with PCanywhere and a modem or allowing null passwords.
Originally posted by: werk
acemcmac, just give up now before you make yourself look any worse. You're playing with fire.
Originally posted by: spidey07
Originally posted by: acemcmac
Originally posted by: spidey07
Originally posted by: acemcmac
Originally posted by: n0cmonkey
Originally posted by: acemcmac
Originally posted by: n0cmonkey
Originally posted by: acemcmac
It's against policy, that's enough of a reason.
No, it's not. I helped write this school's network administration policies before I got a better offer. They just think they know better what I want to do with the comptuer than I do and deleted "extraneous and confusing information." To this day, I am the only administrator on the network after hours and the one of the only people with the authority to reverse access suspensions on the residental network. I have never needed M$ administrator access and have never asked for it. This kind of stuff is just unbelieveable.
If you wrote the policies and did not ban remote desktop and similar software, you missed quite a bit. Bad policy bitch, bad.
If you have no servers that allow such a primative protocol to gain access to them, what in the hell are you vounerable to? Someone using their home computer to print to the computer on their desk? Someone uploading malicious files that your firewall should be intercepting? This traffic isn't even leaving the gateway.... it's packet shaped out... this is traveling across the lan strictly..... no reason at all for it to be blocked
What isn't necessary, is bad.
Wrong. Again, that is the coorperate paradigm. In a corperation, IT is responsible to management and ownership. When IT does not accomidate them, they are useless and need to go. In education, IT is responsible to the faculty and students. When IT does not accomidate them, they are useless and need to go.
Wrong. IT is just another department that answers to the food chain. That food chain reports to owners. Ownsers report to auditors. It has nothing to do with students/faculty/employees, etc. Nothing whatsoever.
College of DuPont, (first google hit) Office of Information Technology Mission Statement, 4th bullet
Develop and maintain highly effective, reliable, secure, and innovative information systems to support instructional, administrative and research functions.
You just got served
I come from the real world, not what you find on google. Lip service from a department is just that, lip service. If you came from the "real world" as well you would know how truthful mission statements are.
next?
Originally posted by: acemcmac
You still completley fail to adress a single threat that Remote Desktop poises an educational environment that banning Remote Desktop would adress. I reiterate, you do not have any idea what you're talking about.
Originally posted by: acemcmac
Originally posted by: spidey07
Originally posted by: acemcmac
Originally posted by: werk
Maybe you should quit whining here and figure out a way to "get your fvcking work done."
I did, I needed a file from my home server, got it via remote desktop and sent it off to the prof.
Been having problems with the FTP server I use as backup for the same purpose, so I was a little screwed there....
Originally posted by: spidey07
Originally posted by: acemcmac
Originally posted by: n0cmonkey
Originally posted by: acemcmac
It's against policy, that's enough of a reason.
No, it's not. I helped write this school's network administration policies before I got a better offer. They just think they know better what I want to do with the comptuer than I do and deleted "extraneous and confusing information." To this day, I am the only administrator on the network after hours and the one of the only people with the authority to reverse access suspensions on the residental network. I have never needed M$ administrator access and have never asked for it. This kind of stuff is just unbelieveable.
If you wrote the policies and did not ban remote desktop and similar software, you missed quite a bit. Bad policy bitch, bad.
If you have no servers that allow such a primative protocol to gain access to them, what in the hell are you vounerable to? Someone using their home computer to print to the computer on their desk? Someone uploading malicious files that your firewall should be intercepting? This traffic isn't even leaving the gateway.... it's packet shaped out... this is traveling across the lan strictly..... no reason at all for it to be blocked
oh please Mr. Network Security guru, explain to us how a firewall can stop malicous files or code?
Or for that matter malicous activity at all.
Is there any encryption on remote desktop at all? If Cisco has firmwares that, at swich level, can identify and remove common variants of worms etc, firewalls can be configured to provide the same basic security to primative remote sessions. Anything you are exposing yourself to by allowing remote desktop, you are already exposing yourself to by not doing a pat down search of every client looking for their thumbdrives or cdrom's....
Layer 2-4 devices cannot inspect layer 7 traffic. Please explain how a firewall is to block malicous code.
Id also like to know how a layer 2 device (as you explained) can identify and remove a worm - given that you belive even a layer4 device can do it (which it can't)
Owned again
Originally posted by: acemcmac
sure, next thing you're going to tell me is that educational environments mandate that kids in dorms run the latest ghost images and are locked into the domain for security.... This is not how education works. That is how corperations work. Admit that you have no idea what you are talking about. State Universities are just as beholden to their sworn mission statements as the President is to look out for the best interests of the country- It's all government
Originally posted by: spidey07
I am intimately familiar with netflow and the third party tools to analyze the information provided.
Please explain how netflow can remove a worm as you posted and I quote again...
"If Cisco has firmwares that, at swich level, can identify and remove common variants of worms etc, firewalls can be configured to provide the same basic security to primative remote sessions"
And for your information software running on Cisco Systems router and switches is called IOS or CatOS, not firmware. We reserve firmware for the kiddy linksys stuff.
Look kid, I've been doing this stuff quite a long time now and your gripes have all been heard before. If you wanna "own" then provide your own insight, not something you found on google.
How the hell was he owned? The guy (not the router) in the article used the output from a traffic monitoring tool to identify a worm. The guy, not the router, fixed the problem (which, according to you, shouldn't have even entered the network anyways!).Originally posted by: acemcmac
Originally posted by: spidey07
Originally posted by: acemcmac
Originally posted by: werk
Maybe you should quit whining here and figure out a way to "get your fvcking work done."
I did, I needed a file from my home server, got it via remote desktop and sent it off to the prof.
Been having problems with the FTP server I use as backup for the same purpose, so I was a little screwed there....
Originally posted by: spidey07
Originally posted by: acemcmac
Originally posted by: n0cmonkey
Originally posted by: acemcmac
It's against policy, that's enough of a reason.
No, it's not. I helped write this school's network administration policies before I got a better offer. They just think they know better what I want to do with the comptuer than I do and deleted "extraneous and confusing information." To this day, I am the only administrator on the network after hours and the one of the only people with the authority to reverse access suspensions on the residental network. I have never needed M$ administrator access and have never asked for it. This kind of stuff is just unbelieveable.
If you wrote the policies and did not ban remote desktop and similar software, you missed quite a bit. Bad policy bitch, bad.
If you have no servers that allow such a primative protocol to gain access to them, what in the hell are you vounerable to? Someone using their home computer to print to the computer on their desk? Someone uploading malicious files that your firewall should be intercepting? This traffic isn't even leaving the gateway.... it's packet shaped out... this is traveling across the lan strictly..... no reason at all for it to be blocked
oh please Mr. Network Security guru, explain to us how a firewall can stop malicous files or code?
Or for that matter malicous activity at all.
Is there any encryption on remote desktop at all? If Cisco has firmwares that, at swich level, can identify and remove common variants of worms etc, firewalls can be configured to provide the same basic security to primative remote sessions. Anything you are exposing yourself to by allowing remote desktop, you are already exposing yourself to by not doing a pat down search of every client looking for their thumbdrives or cdrom's....
Layer 2-4 devices cannot inspect layer 7 traffic. Please explain how a firewall is to block malicous code.
Id also like to know how a layer 2 device (as you explained) can identify and remove a worm - given that you belive even a layer4 device can do it (which it can't)
Owned again
Originally posted by: acemcmac
Originally posted by: spidey07
Originally posted by: acemcmac
Originally posted by: spidey07
Originally posted by: acemcmac
Originally posted by: n0cmonkey
Originally posted by: acemcmac
Originally posted by: n0cmonkey
Originally posted by: acemcmac
It's against policy, that's enough of a reason.
No, it's not. I helped write this school's network administration policies before I got a better offer. They just think they know better what I want to do with the comptuer than I do and deleted "extraneous and confusing information." To this day, I am the only administrator on the network after hours and the one of the only people with the authority to reverse access suspensions on the residental network. I have never needed M$ administrator access and have never asked for it. This kind of stuff is just unbelieveable.
If you wrote the policies and did not ban remote desktop and similar software, you missed quite a bit. Bad policy bitch, bad.
If you have no servers that allow such a primative protocol to gain access to them, what in the hell are you vounerable to? Someone using their home computer to print to the computer on their desk? Someone uploading malicious files that your firewall should be intercepting? This traffic isn't even leaving the gateway.... it's packet shaped out... this is traveling across the lan strictly..... no reason at all for it to be blocked
What isn't necessary, is bad.
Wrong. Again, that is the coorperate paradigm. In a corperation, IT is responsible to management and ownership. When IT does not accomidate them, they are useless and need to go. In education, IT is responsible to the faculty and students. When IT does not accomidate them, they are useless and need to go.
Wrong. IT is just another department that answers to the food chain. That food chain reports to owners. Ownsers report to auditors. It has nothing to do with students/faculty/employees, etc. Nothing whatsoever.
College of DuPont, (first google hit) Office of Information Technology Mission Statement, 4th bullet
Develop and maintain highly effective, reliable, secure, and innovative information systems to support instructional, administrative and research functions.
You just got served
I come from the real world, not what you find on google. Lip service from a department is just that, lip service. If you came from the "real world" as well you would know how truthful mission statements are.
next?
sure, next thing you're going to tell me is that educational environments mandate that kids in dorms run the latest ghost images and are locked into the domain for security.... This is not how education works. That is how corperations work. Admit that you have no idea what you are talking about. State Universities are just as beholden to their sworn mission statements as the President is to look out for the best interests of the country- It's all government
Originally posted by: n0cmonkey
Originally posted by: acemcmac
You still completley fail to adress a single threat that Remote Desktop poises an educational environment that banning Remote Desktop would adress. I reiterate, you do not have any idea what you're talking about.
One single moron allowing it without knowing what it is or what it does is reason enough. Just what you need, a professor allowing the students to control his PC.
Originally posted by: spidey07
Originally posted by: acemcmac
Originally posted by: spidey07
Originally posted by: acemcmac
Originally posted by: spidey07
Originally posted by: acemcmac
Originally posted by: n0cmonkey
Originally posted by: acemcmac
Originally posted by: n0cmonkey
Originally posted by: acemcmac
It's against policy, that's enough of a reason.
No, it's not. I helped write this school's network administration policies before I got a better offer. They just think they know better what I want to do with the comptuer than I do and deleted "extraneous and confusing information." To this day, I am the only administrator on the network after hours and the one of the only people with the authority to reverse access suspensions on the residental network. I have never needed M$ administrator access and have never asked for it. This kind of stuff is just unbelieveable.
If you wrote the policies and did not ban remote desktop and similar software, you missed quite a bit. Bad policy bitch, bad.
If you have no servers that allow such a primative protocol to gain access to them, what in the hell are you vounerable to? Someone using their home computer to print to the computer on their desk? Someone uploading malicious files that your firewall should be intercepting? This traffic isn't even leaving the gateway.... it's packet shaped out... this is traveling across the lan strictly..... no reason at all for it to be blocked
What isn't necessary, is bad.
Wrong. Again, that is the coorperate paradigm. In a corperation, IT is responsible to management and ownership. When IT does not accomidate them, they are useless and need to go. In education, IT is responsible to the faculty and students. When IT does not accomidate them, they are useless and need to go.
Wrong. IT is just another department that answers to the food chain. That food chain reports to owners. Ownsers report to auditors. It has nothing to do with students/faculty/employees, etc. Nothing whatsoever.
College of DuPont, (first google hit) Office of Information Technology Mission Statement, 4th bullet
Develop and maintain highly effective, reliable, secure, and innovative information systems to support instructional, administrative and research functions.
You just got served
I come from the real world, not what you find on google. Lip service from a department is just that, lip service. If you came from the "real world" as well you would know how truthful mission statements are.
next?
sure, next thing you're going to tell me is that educational environments mandate that kids in dorms run the latest ghost images and are locked into the domain for security.... This is not how education works. That is how corperations work. Admit that you have no idea what you are talking about. State Universities are just as beholden to their sworn mission statements as the President is to look out for the best interests of the country- It's all government
Again, I'll reiterate my experience having designed and built network strategies for Purdue University, University of North Carolina and some work at the pentagon (with associated clearence)
A security policy is developed with input from the network security department, ops, support and officer level. Once it is agreed upon technology is used to enforce that policy.
One of the most basic components of security policy is remote control. It has been decided that the network you are attached to will not allow remote control software.
But hey if you want to get around that policy then by all means do, its not hard.
So how does a layer4 firewall in combination with layer 2-3 routers and switches stop malicious code, let alone remove it?
