On Sun, May 24, 2009 at 2:56 PM, Ryan Rix <
phrkonaleash@gmail.com> wrote:
> http://support1.cox.com/sdccommon/asp/contentredirect.asp?sprt_cid=643ad749-1a58-4824-9d1c-8cd5579e132a
"Microsoft SQL Server is a database application with a long history of
security exploits, and is noted for the propagation of the SQLslammer
worm. These ports are filtered to prevent exploitation and propagation
of such MS-SQL exploits."
The rest of that article and its rationales is somewhat FUD. A
bandwidth cap or so would be more affective at curbing such virii and
upstream usage than a simple network block. It's all about charging
users every last cent (for static IP, unclocked ports, business
contracts, etc)
On an off note, I didn't know that they blocked port 25 EXCEPT for cox
servers. What a load of sh*t. Sounds like we're all staying at some
third rate hotel.
Ryan
--
Thanks and best regards,
Ryan Rix
TamsPalm - The PalmOS Blog
(623)-239-1103 <-- Grand Central, baby!
Jasmine Bowden - Class of 2009, Marc Rasmussen - Class of 2008, Erica
Sheffey - Class of 2009, Rest in peace.
---------------------------------------------------
PLUG-discuss mailing list -
PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change your mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss