Could we all please put away our members for a moment? The bottom line is, there are times and places where "port scanning" is required. I would assume the intelligence level of this group warrants no in depth explanation or case study. How about this, differentiating between legitimate "port scans" and preempts to an attack. How, when, and where. Also, correct escalation procedures to security departments and law officials. Jade Jade E. Deane Network Engineer helloNetwork.com Las Vegas, Nevada Office: +1 (702) 938-9267 Cell: +1 (702) 604-4759 Fax: +1 (702) 456-1471 email: jade.deane@helloNetwork.com urgent epage: 7026044759@page.nextel.com -----Original Message----- From: Roeland Meyer [mailto:rmeyer@mhsc.com] Sent: Tuesday, December 19, 2000 12:41 PM To: 'Dan Hollis'; Roeland Meyer Cc: Shawn McMahon; 'nanog@merit.edu' Subject: RE: Port scanning legal
From: Dan Hollis [mailto:goemon@sasami.anime.net] Sent: Tuesday, December 19, 2000 12:26 PM
The argument against port-scanning applies equally well to just about every diagnostic tool we use.
Only by the most convoluted thinking.
Let's see, we *are* talking court cases and lawyers here ... what was that you said about convoluted thinking? When was th last time you argued with an attorney, either in or out of court? When was the last successful time?
participants (1)
-
Jade E. Deane