• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

University is going to set up an invasive program

cmdrmoocow

Golden Member
Embry-Riddle Aeronautical University; Daytona Beach

We just found out that the IT dept is setting up a monitoring system on the network.

Ok, ok, not a big deal - I don't doubt that they already have that in place. The difference here is that you must have a certain program running on your computer to let it on. The other things that it can do is scan your computer for certain 'files' and corrupt them. The thing advertised is DRM related, but it has the ability to be configured for 'other things'.

They accidently turned it on a moment ago, and thus a few of us spirited the install file for it (appears to be junk) from this Floridian startup.

The special thing is that it only runs when it identifies your computer as a Windows operating system, if only at the moment. Mac and Linux's are let free.... for now.

What to do?

Make a stink about it to get rid of it (unlikely - I found out that its been in the works for a year+)

Bend over and take it.

OS Fingerprint spoof

Change everyone over to Linux (incredible amount of time, considering my lack of expertise)

Zombify the exe to report A-OK.



Ideas? What can anyone dig up on this company? I have the install file for those interested.
 
Why not just setup your own little network and have a linux box do some NATing with the satan network? Or even a proxy?

I had a friend lose his Internet access at Univ. of Florida for 3 months for using bit torrent to download Fedora. Just for using the ports, they didn't even actually look at his computer. Thats messed up.
 
Originally posted by: PorBleemo
I would never go to a college like that.

Sounds like the college is starting to run a network like it should.

The days of just plugging in are over. Nowadays you must be authenticated, scanned and ensure that you are patched, up-to-date virus pattern and firewall installed with their policy.

I applaud your university for doing what they should.

We can no longer afford to have virus/worm laden machines bringing the network to a stand still.

especially allowing peer-2-peer and bit torrent. That crap needs to be outlawed. If a machine is running that crap network access needs to be removed. Permantently.

Thank goodness there is finally technology to enforce this kind of good network policy.

-ps- the software will soon be released for linux and mac
 
Ack.....

Way to "1984ish"....that's just wrong.......

Call the ACLU... they'll fight for anything! (kinda like Mikey and his Life cereal... 🙂
 
Originally posted by: spidey07
Originally posted by: PorBleemo
I would never go to a college like that.

Sounds like the college is starting to run a network like it should.

The days of just plugging in are over. Nowadays you must be authenticated, scanned and ensure that you are patched, up-to-date virus pattern and firewall installed with their policy.

I applaud your university for doing what they should.

We can no longer afford to have virus/worm laden machines bringing the network to a stand still.

especially allowing peer-2-peer and bit torrent. That crap needs to be outlawed. If a machine is running that crap network access needs to be removed. Permantently.

Thank goodness there is finally technology to enforce this kind of good network policy.

-ps- the software will soon be released for linux and mac

The software sounds a little like Icarus, but I didn't think that had a client.

Sounds like you work for this company, a company that makes similar software or a net admin who doesn't actually know how to manage a network without blanket banning applications.

Lets go over a few ways you can have a stable network without the need for your product. We'll just go line by line if that's ok for you...

Nowadays you must be authenticated, scanned and ensure that you are patched, up-to-date virus pattern and firewall installed with their policy.

That's why you scan clients before you allow them to have a public IP or an IP that has routing to anything on your network besides Windows Update or similar places to download patches from. Or....gasp have your own patch repository so it doesn't even use any of your bandwidth.

I applaud your university for doing what they should.
I applaud your university for stifling learning, banning legitimate use of apps, being overall lazy in the management of their network. Oh yea, and modifying YOUR files without YOUR consent on YOUR computer. That's always nice.

We can no longer afford to have virus/worm laden machines bringing the network to a stand still.
Yea I'd say that too if I wanted to sell a product that promised to prevent just this for thousands of dollars. How about quarantining computers until they have the correct patches or when you detect an exploit? Rather than just let computers onto your network, put them in a safe network where you can scan them for open exploits. Oh...and maybe do this throughout your network to see if new ones are around? Or better than buying some stupid invasive filter, go buy a site license for some antivirus program and offer it as a free download. (My college does this.)

especially allowing peer-2-peer and bit torrent. That crap needs to be outlawed. If a machine is running that crap network access needs to be removed. Permantently.

Yea, you wouldn't want to actually allow things that have legitimate uses. Isn't bittorrent or something like that part of the Steam system that valve uses? Yea, totally illegal, wouldn't want that to have been invented, better outlaw it. Hey here's an idea, if you don't want it running on your network.....block the ports.

Thank goodness there is finally technology to enforce this kind of good network policy.
That's cool, here make an open ftp to your computer with full access and PM me the ip, login and password, I'll take a look through your files and determine what I think to be "worthy" of being on your computer. Oh yea, I'll just corrupt stuff I don't think is any good without asking. Hey I've got an idea, why don't you just decide that you don't like linux on your network and corrupt the kernel or any of the other files needed to run. Wouldn't want people to learn...


-ps- the software will soon be released for linux and mac
Yea I'm sure that linux software is gonna be working for a REAL long time once it gets out in the open. I give it maybe a week before this software has a new one ripped for it.

Where I go to school, where we don't have things like this, we actually are able to experiment and learn things. Oh and gasp, our network doesn't have half these problems because our guys know what they are doing.

access needs to be removed. Permantently.
Yea that's "Permanently" I guess your college blocked access to dictionaries.
 
Originally posted by: ColdZero
~
~
~

Whats interesting is that of the things that you named, we have most of them.

Scanning before letting you in? check.
Have own private network set up so that users can update their windows boxen with patches on your servers? check.
Have site liscense for anti-virus? check. McAffee - not my choice, but hey, it works.
Port-blocking / packet shaping for things like Bittorrent and bandwidth hogs? check.

Only thing left on the checklist is a way to screw its students. They'll have that covered in 'a couple weeks'.


According to the rumor that the other students shared with me, this has something to do with the Univ/Gov't/someone wanting to know what kind of data that we've accumulated. If we had something to back that up, we could have a case.
 
Originally posted by: spidey07
Originally posted by: PorBleemo
I would never go to a college like that.
Sounds like the college is starting to run a network like it should.

Spoken like a true BOFH.

Originally posted by: spidey07
The days of just plugging in are over. Nowadays you must be authenticated, scanned and ensure that you are patched, up-to-date virus pattern and firewall installed with their policy.
I applaud your university for doing what they should.
We can no longer afford to have virus/worm laden machines bringing the network to a stand still.
I fail to see how that in any way relates to the subject matter at hand, really.

Originally posted by: spidey07
especially allowing peer-2-peer and bit torrent. That crap needs to be outlawed. If a machine is running that crap network access needs to be removed. Permantently.
You're right. Why risk insecurity, from peer-to-peer networks. Might as well not even offer any sort of network access at all, especially in a place like an education institution. Heaven forbid that someone, someday, might discover this thing called the "internet", and use it to learn something.

Here's a clue - the internet itself is a peer-to-peer network. Therefore, obviously, you are for banning internet-access outright, I assume.

Originally posted by: spidey07
Thank goodness there is finally technology to enforce this kind of good network policy.
Why not just cut the cables, wouldn't that be easiest? Or go on room-to-room searches in the dorms, for contraband items like "computers". I mean, they could use them to access that big peer-to-peer network called the internet, using a dial-up connection over the telephone lines! Scary! Maybe you should cut their phone lines too.

It amazes me sometimes, how many anti-technology people, post on technology-oriented forums, using the exact same tools that they want banned. Frightning, really, when you consider that they might actually be in a position of power to enforce those constraints on others. Generally it stems from fear, which itself stems from ignorance. Too bad, really.
 
More seriously, what systems do they intend to install this program on? University office-staff machines, or student machines? BEcause there is a very large, and very real difference, in what they can do, legally. The office staff machines, are obviously owned by the uni., and can be treated much like office PCs at a business (eg. the user of them is on company time, and basically has no implied right to privacy). Student machines are anothing thing entirely, and they are their own, and they do have a right to privacy. It is utterly ridiculous, and very big-brother-ish, to try to force them to run some sort of invasive network client software on their private machines - worse yet, software that (allegedly) could allow a remote 3rd-party to either access, or destroy, what is private information. I think that the EFF would also be interested in learning about this, as would, possibly, Politechbot, and some other sites.

Do you have any concrete information, about the proposed deployment of this software, besides the software itself?

Also, considering the recently-passed anti-spyware legislation, and the fact that the student's computers are their own, and they are the admins as well, then wouldn't this sort of software possibly be covered under those new laws?
 
Originally posted by: VirtualLarry
More seriously, what systems do they intend to install this program on? University office-staff machines, or student machines? BEcause there is a very large, and very real difference, in what they can do, legally. The office staff machines, are obviously owned by the uni., and can be treated much like office PCs at a business (eg. the user of them is on company time, and basically has no implied right to privacy). Student machines are anothing thing entirely, and they are their own, and they do have a right to privacy. It is utterly ridiculous, and very big-brother-ish, to try to force them to run some sort of invasive network client software on their private machines - worse yet, software that (allegedly) could allow a remote 3rd-party to either access, or destroy, what is private information. I think that the EFF would also be interested in learning about this, as would, possibly, Politechbot, and some other sites.

Do you have any concrete information, about the proposed deployment of this software, besides the software itself?

Also, considering the recently-passed anti-spyware legislation, and the fact that the student's computers are their own, and they are the admins as well, then wouldn't this sort of software possibly be covered under those new laws?

One problem is that universities can and will be held liable for the stupidity of the users. When you attatch yourself to their network, you're going to have to live by their rules.

While I don't agree with everything this program may do, universities need to keep tighter grip on their networks. I'm tired of seeing events in my IDS systems from .edus.
 
Originally posted by: VirtualLarry
Originally posted by: spidey07
Originally posted by: PorBleemo
I would never go to a college like that.
Sounds like the college is starting to run a network like it should.

Spoken like a true BOFH.

That's the way real networks need to be run.

Originally posted by: spidey07
The days of just plugging in are over. Nowadays you must be authenticated, scanned and ensure that you are patched, up-to-date virus pattern and firewall installed with their policy.
I applaud your university for doing what they should.
We can no longer afford to have virus/worm laden machines bringing the network to a stand still.
I fail to see how that in any way relates to the subject matter at hand, really.

The software makes sure the computer has the latest patches. It authenticates the user. It makes sure basic security measures are taken. All things that are necessary on real networks. You might come into contact with one when you get out of your parents' basement.

Originally posted by: spidey07
especially allowing peer-2-peer and bit torrent. That crap needs to be outlawed. If a machine is running that crap network access needs to be removed. Permantently.
You're right. Why risk insecurity, from peer-to-peer networks. Might as well not even offer any sort of network access at all, especially in a place like an education institution. Heaven forbid that someone, someday, might discover this thing called the "internet", and use it to learn something.

Here's a clue - the internet itself is a peer-to-peer network. Therefore, obviously, you are for banning internet-access outright, I assume.

It is not the p2p network that the masses will think of when you say "peer to peer." p2p is as derogatory as the term "hacker" is these days, no matter what traditionalists want.

Originally posted by: spidey07
Thank goodness there is finally technology to enforce this kind of good network policy.
Why not just cut the cables, wouldn't that be easiest? Or go on room-to-room searches in the dorms, for contraband items like "computers". I mean, they could use them to access that big peer-to-peer network called the internet, using a dial-up connection over the telephone lines! Scary! Maybe you should cut their phone lines too.

Why not take care of your computer? It's the simplest method, but some people are too ignorant to do so. Do a search on this forum, see how many people say they don't care if they get hacked because they don't keep anything "important" on their machines.

It amazes me sometimes, how many anti-technology people, post on technology-oriented forums, using the exact same tools that they want banned. Frightning, really, when you consider that they might actually be in a position of power to enforce those constraints on others. Generally it stems from fear, which itself stems from ignorance. Too bad, really.

Yeah, Spidey07 is one of those "security n00bs" that thinks he knows something. :roll:
 
I'm all for a university tightening down their network and restricting what students can do. I've been at universities that left the network completely unrestricted...and it was exploited to the extent that I couldn't even do my legitimate school work. So I agree on that point...a university SHOULD do what it must to ensure the network is not clogged with P2P, virus/worm, and other traffic. Most of this can be solved at the network level, rather than going so far as the host level.

What would get me about this situation is a university requiring me to install software on my personal computer, software that they controlled. I wouldn't stand for that. If it were the only way, sure...I might be accepting of that. However, let's look at some of the ways you can effectively kill P2P, worm, excessive gaming, and unauthorized server traffic without resorting to this level of extremism:

1) Per-Port Private VLAN's
2) Each port having a 252 subnet mask. One address for the port, one address for the end system.
3) Packet shaper at the edge of the network rate limiting and prioritizing traffic
4) Intrusion Prevention System at the edge of the network to flag malicious/worm traffic

You dont even need 802.1x in this setup, and it would make a reasonably secure network. You really dont even have to block ports...except for maybe 135/137/139/445/6667(maybe). Students like to game, so set the packet shaper to give gaming 50% of whatever the current available bandwidth is. But make HTTP/HTTPS and email a higher priority than gaming.

I'm of the belief that if you're gonna go so far as to require this type of software on someone's personal machine, then you just might as well put a PC that you control in every dorm room.

For those of you who argue against a university acting like an ISP and not blocking anything...when was the last time your ISP voluntarily free-of-charge cleaned viruses and worms off 3,000 computers over the course of 3 weeks? If colleges are going to act like ISP's, they need to have the legal protection ISP's have, and they need to stop treating students like babies. If their PC's get hosed...tough crap. That's not the way any university I've ever attended acts. As long as they're expected to help students fix their computers, they should have the right to protect their network as well.
 
Originally posted by: n0cmonkey
One problem is that universities can and will be held liable for the stupidity of the users. When you attatch yourself to their network, you're going to have to live by their rules.

While I don't agree with everything this program may do, universities need to keep tighter grip on their networks. I'm tired of seeing events in my IDS systems from .edus.

You get IDS events, because someone at an .edu is using BT to download Linux ISOs... ?

Oh yes, that's right, the two have nothing to do with each other.

I'm not against admins being pro-active in constraining their users' network-activity, if such activity is indeed malicious, but I fail to see how forcing someone to install invasive probably RIAA-sponsored "copyright cop" monitoring tools would stop the same sort of "malicious hacking behavior" that you seem to be talking about.

In short, straw-man, therefore irrelevant to this discussion.

Also, about the "have to live by their rules" - guess what, the law is on the side of the student's privacy here, and universities still have to abide by the law.
 
Originally posted by: n0cmonkey
Originally posted by: VirtualLarry
Originally posted by: spidey07
The days of just plugging in are over. Nowadays you must be authenticated, scanned and ensure that you are patched, up-to-date virus pattern and firewall installed with their policy.
I applaud your university for doing what they should.
We can no longer afford to have virus/worm laden machines bringing the network to a stand still.
I fail to see how that in any way relates to the subject matter at hand, really.

The software makes sure the computer has the latest patches. It authenticates the user. It makes sure basic security measures are taken. All things that are necessary on real networks. You might come into contact with one when you get out of your parents' basement.

I guess you missed the point - I don't disagree with any of those measures. However, they have nothing to do with what is being discussed here. (Which is exactly what I said before, and you intentionally chose to overlook, specifically to insult me. I hope you enjoyed it, because the allegation is untrue.)

What is being discussed here, is, apparently, the (planned?) forced installation of software onto students machines, in an apparent violation of their legal rights, in order to help uphold an (illegal) monopoly on music/media-distribution, at the behest of some powerful corporations.

Let's look at this plainly - look at the analog of a residental telephone installation. The "network", as such, extends right to the edge of the customer's premesis. Yet the telco does not have the right to intrude into the customer's home, for any reason.

In the same vein, the school has a right to control the packets flowing over their network, and to disconnect the user if they so choose, from that network. That is their right. but they have no right to forcibly install software onto a student's private machine, much less software with intentionally malicious capability.

What's next? Forced spyware/adware onto student's machines, because the university has a contract with some major advertising company, and they feel that their students are a captive audience that they can force to view ads? Utterly ridiculous.

Originally posted by: n0cmonkey
Originally posted by: VirtualLarry
Originally posted by: spidey07
especially allowing peer-2-peer and bit torrent. That crap needs to be outlawed. If a machine is running that crap network access needs to be removed. Permantently.
You're right. Why risk insecurity, from peer-to-peer networks. Might as well not even offer any sort of network access at all, especially in a place like an education institution. Heaven forbid that someone, someday, might discover this thing called the "internet", and use it to learn something.

Here's a clue - the internet itself is a peer-to-peer network. Therefore, obviously, you are for banning internet-access outright, I assume.

It is not the p2p network that the masses will think of when you say "peer to peer." p2p is as derogatory as the term "hacker" is these days, no matter what traditionalists want.

I think that what he meant to say was, "file-sharing network", but really, that's basically what the internet was built for in the first place too. But the statements be made were very clearly anti-technology, and not against a user's malicious or illegal mis-use of technology. That's what was most disturbing about them. I could easily turn around and argue that network-based backup software equated to a "peer to peer file-sharing network", and should likewise be made illegal. Certainly, that would be a ludicrous statement - but then again, so is spidey07's statement that such technology should be outlawed.

Originally posted by: n0cmonkey
Originally posted by: VirtualLarry
Originally posted by: spidey07
Thank goodness there is finally technology to enforce this kind of good network policy.
Why not just cut the cables, wouldn't that be easiest? Or go on room-to-room searches in the dorms, for contraband items like "computers". I mean, they could use them to access that big peer-to-peer network called the internet, using a dial-up connection over the telephone lines! Scary! Maybe you should cut their phone lines too.

Why not take care of your computer? It's the simplest method, but some people are too ignorant to do so. Do a search on this forum, see how many people say they don't care if they get hacked because they don't keep anything "important" on their machines.

I'm sorry that you equate using a (relatively new) internet file-transfer protocol to download GPL'ed software, with a poorly-maintained, virus-infected machine (generally a Win32 machine). Ironically, perhaps he was in the process of downloading a Linux ISO with the specific intent to improve the security and "cleanliness" of his machine, by running something other than the usually leaky sieve that is 'Windows'.

Originally posted by: n0cmonkey
Originally posted by: VirtualLarry
It amazes me sometimes, how many anti-technology people, post on technology-oriented forums, using the exact same tools that they want banned. Frightning, really, when you consider that they might actually be in a position of power to enforce those constraints on others. Generally it stems from fear, which itself stems from ignorance. Too bad, really.
Yeah, Spidey07 is one of those "security n00bs" that thinks he knows something. :roll:

Did I call him a "n00b"? No I did not. Please do not put words into my mouth, thank you.

I will plainly and willingly call him "ignorant" though, based on his apparent attitude towards new network technology, along with his strange affection for NAT, which effectively will lead to the breakdown of the internet as we know it. I feel that the anti-technology comment is therefore quite accurate.
 
Basically, bottom-line, the uni. wants to intrude on the student's legal rights - they should have to pay the full consequences of such. If that means jail time for the (alleged) spyware creators or deployers, then I'm all for it.
 
Originally posted by: spidey07
Originally posted by: PorBleemo
I would never go to a college like that.

Sounds like the college is starting to run a network like it should.

The days of just plugging in are over. Nowadays you must be authenticated, scanned and ensure that you are patched, up-to-date virus pattern and firewall installed with their policy.

I applaud your university for doing what they should.

We can no longer afford to have virus/worm laden machines bringing the network to a stand still.

especially allowing peer-2-peer and bit torrent. That crap needs to be outlawed. If a machine is running that crap network access needs to be removed. Permantently.

Thank goodness there is finally technology to enforce this kind of good network policy.

-ps- the software will soon be released for linux and mac

I guess I didn't understand it that way spidey07. If that's all it does is monitor computer security then that's fine by me. But I don't like the fact that it monitors what music and videos you play.
 
Actually I think you have a case now. I remember something similar when windows activation came out. Oh yea, priated keys, if microsoft detets a pirated key, they, by law are not allowed to damage your computer or prevent it from running. They only thing they can do is prevent you from accessing new services they offer, such as windows update. They cannot corrupt or damage files on your computer for having a pirated key. I'll see if I can find the article, I think it was from around when SP1 came out.

So I don't see how your school can go around corrupting files on students' personal computers that the college does not own. They should only be able to deny you network access.
 
The software makes sure the computer has the latest patches. It authenticates the user. It makes sure basic security measures are taken. All things that are necessary on real networks. You might come into contact with one when you get out of your parents' basement.

I've worked as one of the sysadmins on the Citigroup network down in NYC, in the building that was supposed to get blown up, and we never ran into problems like this, sure we had worms, but we didn't have to go around messing with users's personal files to make it stop. And the network never ground to a halt. I would imagine that if we had installed software like this and it corrupted somebody's data for some project that was in the works, somebody would get fired and that system would be defanged. And that was where Citigroup ownes every one of the computers not on the personal computers of students. The only reason this University is allowed to do this is because it is college students.
 
Originally posted by: VirtualLarry
Originally posted by: n0cmonkey
One problem is that universities can and will be held liable for the stupidity of the users. When you attatch yourself to their network, you're going to have to live by their rules.

While I don't agree with everything this program may do, universities need to keep tighter grip on their networks. I'm tired of seeing events in my IDS systems from .edus.

You get IDS events, because someone at an .edu is using BT to download Linux ISOs... ?

Oh yes, that's right, the two have nothing to do with each other.

I'm not against admins being pro-active in constraining their users' network-activity, if such activity is indeed malicious, but I fail to see how forcing someone to install invasive probably RIAA-sponsored "copyright cop" monitoring tools would stop the same sort of "malicious hacking behavior" that you seem to be talking about.

In short, straw-man, therefore irrelevant to this discussion.

Also, about the "have to live by their rules" - guess what, the law is on the side of the student's privacy here, and universities still have to abide by the law.

No, I get IDS events because people are that shouldn't be are using Bittorrent.

I don't like the idea of the program "corrupting files" and whatnot. I think that is a horrible thing.

Mention terrorism and the students don't have any rights again. It's that simple.
 
Originally posted by: VirtualLarry
Originally posted by: n0cmonkey
Originally posted by: VirtualLarry
Originally posted by: spidey07
The days of just plugging in are over. Nowadays you must be authenticated, scanned and ensure that you are patched, up-to-date virus pattern and firewall installed with their policy.
I applaud your university for doing what they should.
We can no longer afford to have virus/worm laden machines bringing the network to a stand still.
I fail to see how that in any way relates to the subject matter at hand, really.

The software makes sure the computer has the latest patches. It authenticates the user. It makes sure basic security measures are taken. All things that are necessary on real networks. You might come into contact with one when you get out of your parents' basement.

I guess you missed the point - I don't disagree with any of those measures. However, they have nothing to do with what is being discussed here. (Which is exactly what I said before, and you intentionally chose to overlook, specifically to insult me. I hope you enjoyed it, because the allegation is untrue.)

What is being discussed here, is, apparently, the (planned?) forced installation of software onto students machines, in an apparent violation of their legal rights, in order to help uphold an (illegal) monopoly on music/media-distribution, at the behest of some powerful corporations.

Let's look at this plainly - look at the analog of a residental telephone installation. The "network", as such, extends right to the edge of the customer's premesis. Yet the telco does not have the right to intrude into the customer's home, for any reason.

In the same vein, the school has a right to control the packets flowing over their network, and to disconnect the user if they so choose, from that network. That is their right. but they have no right to forcibly install software onto a student's private machine, much less software with intentionally malicious capability.

What's next? Forced spyware/adware onto student's machines, because the university has a contract with some major advertising company, and they feel that their students are a captive audience that they can force to view ads? Utterly ridiculous.

They are not forcing anything. If you do not want the software, you do not have to use it. Plain and simple.

Originally posted by: n0cmonkey
Originally posted by: VirtualLarry
Originally posted by: spidey07
especially allowing peer-2-peer and bit torrent. That crap needs to be outlawed. If a machine is running that crap network access needs to be removed. Permantently.
You're right. Why risk insecurity, from peer-to-peer networks. Might as well not even offer any sort of network access at all, especially in a place like an education institution. Heaven forbid that someone, someday, might discover this thing called the "internet", and use it to learn something.

Here's a clue - the internet itself is a peer-to-peer network. Therefore, obviously, you are for banning internet-access outright, I assume.

It is not the p2p network that the masses will think of when you say "peer to peer." p2p is as derogatory as the term "hacker" is these days, no matter what traditionalists want.

I think that what he meant to say was, "file-sharing network", but really, that's basically what the internet was built for in the first place too. But the statements be made were very clearly anti-technology, and not against a user's malicious or illegal mis-use of technology. That's what was most disturbing about them. I could easily turn around and argue that network-based backup software equated to a "peer to peer file-sharing network", and should likewise be made illegal. Certainly, that would be a ludicrous statement - but then again, so is spidey07's statement that such technology should be outlawed.

Bittorrent is a plague on networks. Especially when users don't bother to set it up well.

Originally posted by: n0cmonkey
Originally posted by: VirtualLarry
Originally posted by: spidey07
Thank goodness there is finally technology to enforce this kind of good network policy.
Why not just cut the cables, wouldn't that be easiest? Or go on room-to-room searches in the dorms, for contraband items like "computers". I mean, they could use them to access that big peer-to-peer network called the internet, using a dial-up connection over the telephone lines! Scary! Maybe you should cut their phone lines too.

Why not take care of your computer? It's the simplest method, but some people are too ignorant to do so. Do a search on this forum, see how many people say they don't care if they get hacked because they don't keep anything "important" on their machines.

I'm sorry that you equate using a (relatively new) internet file-transfer protocol to download GPL'ed software, with a poorly-maintained, virus-infected machine (generally a Win32 machine). Ironically, perhaps he was in the process of downloading a Linux ISO with the specific intent to improve the security and "cleanliness" of his machine, by running something other than the usually leaky sieve that is 'Windows'.

FTP and HTTP work quite well and are much nicer to the network. Downloading from these services, and not raping the network, does not require more intelligence than a rock, unlike bittorrent.

Originally posted by: n0cmonkey
Originally posted by: VirtualLarry
It amazes me sometimes, how many anti-technology people, post on technology-oriented forums, using the exact same tools that they want banned. Frightning, really, when you consider that they might actually be in a position of power to enforce those constraints on others. Generally it stems from fear, which itself stems from ignorance. Too bad, really.
Yeah, Spidey07 is one of those "security n00bs" that thinks he knows something. :roll:

Did I call him a "n00b"? No I did not. Please do not put words into my mouth, thank you.

I will plainly and willingly call him "ignorant" though, based on his apparent attitude towards new network technology, along with his strange affection for NAT, which effectively will lead to the breakdown of the internet as we know it. I feel that the anti-technology comment is therefore quite accurate.

NAT is a wonderful thing. IPv6 will change that though.
 
Originally posted by: ColdZero
The software makes sure the computer has the latest patches. It authenticates the user. It makes sure basic security measures are taken. All things that are necessary on real networks. You might come into contact with one when you get out of your parents' basement.

I've worked as one of the sysadmins on the Citigroup network down in NYC, in the building that was supposed to get blown up, and we never ran into problems like this, sure we had worms, but we didn't have to go around messing with users's personal files to make it stop. And the network never ground to a halt. I would imagine that if we had installed software like this and it corrupted somebody's data for some project that was in the works, somebody would get fired and that system would be defanged. And that was where Citigroup ownes every one of the computers not on the personal computers of students. The only reason this University is allowed to do this is because it is college students.

I don't agree with messing with students' files. If there is a reason the students have a fight, it should be because of that. Software that ensures the rest though, would not bother me.

Not that there are not alternatives to this. Setting up the machine so even a root access process does not have access to your files wouldn't take too long.
 
Back
Top