From owner-freebsd-questions@FreeBSD.ORG Mon Aug 27 16:29:32 2007 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id DC1D516A421 for ; Mon, 27 Aug 2007 16:29:32 +0000 (UTC) (envelope-from wmoran@potentialtech.com) Received: from mail.potentialtech.com (internet.potentialtech.com [66.167.251.6]) by mx1.freebsd.org (Postfix) with ESMTP id AE90013C46B for ; Mon, 27 Aug 2007 16:29:32 +0000 (UTC) (envelope-from wmoran@potentialtech.com) Received: from vanquish.pitbpa0.priv.collaborativefusion.com (pr40.pitbpa0.pub.collaborativefusion.com [206.210.89.202]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.potentialtech.com (Postfix) with ESMTP id ACA5CEBC78; Mon, 27 Aug 2007 12:29:31 -0400 (EDT) Date: Mon, 27 Aug 2007 12:29:27 -0400 From: Bill Moran To: lmora013@fiu.edu Message-Id: <20070827122927.17c65f7a.wmoran@potentialtech.com> In-Reply-To: <20070827114101.BIF81036@mailstore3.fiu.edu> References: <20070827114101.BIF81036@mailstore3.fiu.edu> X-Mailer: Sylpheed 2.4.4 (GTK+ 2.10.14; i386-portbld-freebsd6.2) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Cc: freebsd-questions@freebsd.org Subject: Re: circumventing a powermac/NAT router X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 27 Aug 2007 16:29:32 -0000 In response to Luis Morales : > Greetings, > > I have been advised here previously to conceal my home network behind an old > powermac which would be used as a NAT router. Now I have to consider > whether this is worth the expense because if someone is dead intent on > pilfering your research papers and they know where you submit them, wouldn't > they be able to defeat your secure network by stealing your files on the > receiving end? > > Perhaps a concrete example will illustrate: > > i have a mac mni behind a G4, i send a research paper to WebCT and Turnitin-- > that file will now be purloined by the heathen subject, the pawn of Baalzebub > itself. > > Could this happen? Yes. The point, in many cases, is whose fault it is. If I have confidential data about you (SSN, medical info, etc) and I send it to you on your request, then it's stolen from your computer, it's your fault. But if I have your personal information (such as a CC#) and it gets stolen from _my_ server, I'm probably going to be forking over some $$$ to cover your trouble, unless you have a very crappy lawyer. If your CC# gets stolen through no fault of mine, I'm not paying a dime. Don't know how this compares to your research paper scenario, but hopefully it makes a point. -- Bill Moran http://www.potentialtech.com