From owner-freebsd-questions@FreeBSD.ORG Mon Aug 27 16:05:18 2007 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 059EE16A418 for ; Mon, 27 Aug 2007 16:05:18 +0000 (UTC) (envelope-from fatman@crackmonkey.us) Received: from crackmonkey.us (crackmonkey.us [70.58.166.197]) by mx1.freebsd.org (Postfix) with ESMTP id D3A1513C442 for ; Mon, 27 Aug 2007 16:05:17 +0000 (UTC) (envelope-from fatman@crackmonkey.us) Received: from [10.22.8.146] (cpc1-swin7-0-0-cust216.brhm.cable.ntl.com [::ffff:86.18.88.217]) (AUTH: PLAIN fatman, TLS: TLSv1/SSLv3,256bits,AES256-SHA) by crackmonkey.us with esmtp; Mon, 27 Aug 2007 10:05:06 -0600 id 0017C5E3.46D2F637.000068AD Message-ID: <46D2F591.7020403@crackmonkey.us> Date: Mon, 27 Aug 2007 17:02:25 +0100 From: Adam J Richardson User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: lmora013@fiu.edu References: <20070827114101.BIF81036@mailstore3.fiu.edu> In-Reply-To: <20070827114101.BIF81036@mailstore3.fiu.edu> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: freebsd-questions@freebsd.org Subject: Re: circumventing a powermac/NAT router X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 27 Aug 2007 16:05:18 -0000 Luis Morales wrote: > I have been advised here previously to conceal my home network behind an old > powermac which would be used as a NAT router. Now I have to consider > whether this is worth the expense because if someone is dead intent on > pilfering your research papers and they know where you submit them, wouldn't > they be able to defeat your secure network by stealing your files on the > receiving end? Hi Luis. Yes, this is completely possible. No system in the world is immune to determined cracking unless it is turned off, sealed in concrete and dropped in the ocean. Maybe not even then. When it comes to security, a good analogy might be: you can't run faster than the wolf, so just try to run faster than your friend. HtH, Adam J Richardson