Security
-
zandor
- Genuine Member
- Posts: 48
- Joined: Sat Jul 19, 2003 11:55 am
- Location: Evanston, Illinois
- Contact:
I've got a Linux box running a firewall and doing routing for the rest of my rigs.
My main rig has a real IP, but anything else I plug in can use DHCP and get on the net w/ a NAT translated address. (192.168.0.yaddayadda)
Courtesy of work I've got the corporate version of Norton Antivirus on my home machine. Our site liocense e're allowed to install it on one "personally owned" machine if we have a computer running it at work or something like that.
Then I've got webroot spyspweeper as well.
My main rig has a real IP, but anything else I plug in can use DHCP and get on the net w/ a NAT translated address. (192.168.0.yaddayadda)
Courtesy of work I've got the corporate version of Norton Antivirus on my home machine. Our site liocense e're allowed to install it on one "personally owned" machine if we have a computer running it at work or something like that.
Then I've got webroot spyspweeper as well.
Spindle collector. FC-AL 9x18x10k; SCSI 3x36x15k, 1x18x10k, 1x73x10k, 1x9x10k, 1x18x7.2k; IDE 1x120x7.2k, 1x40x5.4k, 1x9x7.2k, 1x6.4x?, 1x2.5x?
- Hipnotic_Tranz
- Almighty Member
- Posts: 3750
- Joined: Wed Nov 22, 2000 6:35 am
- Location: Indpls, IN
- Contact:
Firewall? Nope. I used ZoneAlarm a while back, but other than port scans up the ass I never noticed any malicious activity. Anti-Virus software? Nope, I haven't found a single piece I've liked. I'll run housecalls free virus-scan occasionally to see if I've got anything. Should I get a virus, a recently backed up image is 5 minutes away.
With ghost, it's so easy to load a nice clean image that it's just easier than constatly configuring a firewall. Same goes for a trojan/virus/whatever, gimme 5 minutes and I'll be clean. Maybe I'm ignorant but the worst thing someone could do is to hack into my machine and delete all my music....even then I have a good majority of it spread across my friends machines so it wouldn't take much to get back. I honestly don't think I'm a large target, most hackers with the skills to get into someones machine and delete mass amounts of data have bigger objectives than some no-body on a comcast pipe.
With ghost, it's so easy to load a nice clean image that it's just easier than constatly configuring a firewall. Same goes for a trojan/virus/whatever, gimme 5 minutes and I'll be clean. Maybe I'm ignorant but the worst thing someone could do is to hack into my machine and delete all my music....even then I have a good majority of it spread across my friends machines so it wouldn't take much to get back. I honestly don't think I'm a large target, most hackers with the skills to get into someones machine and delete mass amounts of data have bigger objectives than some no-body on a comcast pipe.
[align=center]<img src=http://i54.tinypic.com/j9tydf.gif>
<i>
My get up and go
must have got up and went.
</i>[/align]
<i>
My get up and go
must have got up and went.
</i>[/align]