On Sun, May 24, 2009 at 2:56 PM, Ryan Rix wrote: > http://support1.cox.com/sdccommon/asp/contentredirect.asp?sprt_cid=643ad749-1a58-4824-9d1c-8cd5579e132a "Microsoft SQL Server is a database application with a long history of security exploits, and is noted for the propagation of the SQLslammer worm. These ports are filtered to prevent exploitation and propagation of such MS-SQL exploits." The rest of that article and its rationales is somewhat FUD. A bandwidth cap or so would be more affective at curbing such virii and upstream usage than a simple network block. It's all about charging users every last cent (for static IP, unclocked ports, business contracts, etc) On an off note, I didn't know that they blocked port 25 EXCEPT for cox servers. What a load of sh*t. Sounds like we're all staying at some third rate hotel. Ryan -- Thanks and best regards, Ryan Rix TamsPalm - The PalmOS Blog (623)-239-1103 <-- Grand Central, baby! Jasmine Bowden - Class of 2009, Marc Rasmussen - Class of 2008, Erica Sheffey - Class of 2009, Rest in peace. --------------------------------------------------- PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us To subscribe, unsubscribe, or to change your mail settings: http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss