DMZ with SME server.

Ryan Rix phrkonaleash at gmail.com
Sun May 24 14:59:54 MST 2009


On Sun, May 24, 2009 at 2:56 PM, Ryan Rix <phrkonaleash at gmail.com> wrote:
> http://support1.cox.com/sdccommon/asp/contentredirect.asp?sprt_cid=643ad749-1a58-4824-9d1c-8cd5579e132a

"Microsoft SQL Server is a database application with a long history of
security exploits, and is noted for the propagation of the SQLslammer
worm. These ports are filtered to prevent exploitation and propagation
of such MS-SQL exploits."
The rest of that article and its rationales is somewhat FUD. A
bandwidth cap or so would be more affective at curbing such virii and
upstream usage than a simple network block. It's all about charging
users every last cent (for static IP, unclocked ports, business
contracts, etc)

On an off note, I didn't know that they blocked port 25 EXCEPT for cox
servers. What a load of sh*t. Sounds like we're all staying at some
third rate hotel.

Ryan

-- 
Thanks and best regards,
Ryan Rix
TamsPalm - The PalmOS Blog
(623)-239-1103 <-- Grand Central, baby!

Jasmine Bowden - Class of 2009, Marc Rasmussen - Class of 2008, Erica
Sheffey - Class of 2009, Rest in peace.


More information about the PLUG-discuss mailing list