TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Geo
from: Mike `/m`
date: 2005-10-09 11:51:04
subject: Re: VPNs

From: Mike '/m' 


Microsoft has said, "We firmly believe that people should have
complete control over what runs on their computers."

http://www.zdnet.com.au/news/software/0,2000061733,39201837,00.htm

You don't believe them?

 /m



On Sun, 9 Oct 2005 09:39:17 -0400, "Geo"  wrote:

>Not entirely true, if the feature is available to any software I load on the
machine then it's up to the programmer as well. If both Intel and MS had
built in user controls so that we could turn on the capabilities for
whatever programs we wanted to allow to access these security features then
I might agree with your "it's up to you" statement.
>
>I don't like control of my machine being taken away from me.
>
>Geo.
>  "Rich"  wrote in message news:4347640f{at}w3.nls.net...
>     Check whatever you want.  It's up to you.
>
>  Rich
>
>    "Geo"  wrote in message
news:43470b84{at}w3.nls.net...
>    enabled and up to date antivirus means nothing. I can't count the number
of Norton protected machines that are trojaned that I see on a daily basis.
>
>    Geo.
>      "Rich"  wrote in message news:43455f13$1{at}w3.nls.net...
>         First, DRM is irrelevant here and unless you are trying to spread FUD
I don't see why you would mention it.
>
>         As for the rest, you should be going back in time.  See
http://www.microsoft.com/technet/security/prodtech/windowsserver2003/quarantine
services/default.mspx.  You can perform whatever validation you want on the
client.  Typical checks would be to verify that client security policy is
met such as enabled and up to date antivirus and firewall.
>
>         In Longhorn this gets extended to the LAN.  See
http://www.microsoft.com/windowsserver2003/technologies/networking/nap/default.
mspx.
>
>         I believe Cisco also has products in this space.
>
>      Rich
>
>
>        "John Beckett"
 wrote in message
news:fpq9k19od4ntbh0flgobh19p4kclbgqetn{at}4ax.com...
>        "Geo"  wrote in message
news::
>        > I guess I'm stupid but I only use VPN's to link secure networks
together,
>        > using one to allow an insecure computer total access to a secure
network
>        > seems like a security accident just waiting to happen.. Insecure
machines
>        > like wandering laptops belong on their own network firewalled from
the
>        > secure network with only limited access.
>
>        We live in interesting times...
>
>        Fast-forwarding to the future by, say, two years:
>        The only half-way decent procedure to allow a roaming laptop to have
>        remote access to your network is to require that the laptop be running
a
>        DRM-protected system, including hardware, BIOS and OS. That way, you
will
>        know that only trusted software is running on the machine.
>
>        Anything less than the Microsoft/Intel/et-al DRM initiative means you
just
>        won't be able to allow roaming machines to connect to the core office
>        network.
>
>        John

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.