[Info-vax] Is Eisner down?
VAXman- at SendSpamHere.ORG
VAXman- at SendSpamHere.ORG
Wed Dec 4 19:31:05 EST 2013
In article <l7oaq8$33v$1 at news.albasani.net>, Jan-Erik Soderholm <jan-erik.soderholm at telia.com> writes:
>VAXman- @SendSpamHere.ORG wrote 2013-12-04 23:09:
>> In article <l7o6ki$h0e$1 at solani.org>, Michael Kraemer <M.Kraemer at gsi.de> writes:
>>> Bill Gunshannon schrieb:
>>>
>>>> I have to say it again. Why on earth would anyone run telnet on any
>>>> server? What can it possibly offer that is worth the risk?
>>>
>>> Less hassle than the mess which comes with ssh/ssl?
>>> And if the network is "internal", what risk?
>>
>> Internal networks have as many if not more reason to use it. It's so easy
>> today to load Linux on a box and fire up Wireshark. It won't take too long
>> before somebody is sniffing the passwords to administrative accounts!
>>
>
>On an older networks using hubs maybe. On a modern network using
>switches, your Wireshark will only see your own network traffic.
>You need some network admin to do some "mangement" in a switch
>to copy others traffic to your port.
You assume that the MCSEs now put in charge of the Corp. network even have a
clue. I spent the past summer, on and off, at a site with issues revolving
about remote shadow copies. Basically, they way the smart-switches had been
configured caused EVERYTHING to appear on the link between the local and the
remote site -- a link that should have been only cluster/shadow traffic. I
doubt very much that those remote VMS boxes could give a shit about Dropbox,
Pandora and Facebook but that crap was appearing on the link to the remote!
--
VAXman- A Bored Certified VMS Kernel Mode Hacker VAXman(at)TMESIS(dot)ORG
Well I speak to machines with the voice of humanity.
More information about the Info-vax
mailing list