[isalist] Re: Network Design and defense...

  • From: "Jim Harrison" <Jim@xxxxxxxxxxxx>
  • To: <isalist@xxxxxxxxxxxxx>
  • Date: Wed, 16 Aug 2006 12:04:00 -0700

http://www.ISAserver.org
-------------------------------------------------------

Complete rebuild of the enterprise using a "rolling migration" methodology. 
We spoke with "the team" and while no one is really happy with the solution, 
they're happy with the involvement in their design.

-------------------------------------------------------
   Jim Harrison
   MCP(NT4, W2K), A+, Network+, PCG
   http://isaserver.org/Jim_Harrison/
   http://isatools.org
   Read the help / books / articles!
-------------------------------------------------------
 

-----Original Message-----
From: isalist-bounce@xxxxxxxxxxxxx [mailto:isalist-bounce@xxxxxxxxxxxxx] On 
Behalf Of Thomas W Shinder
Sent: Wednesday, August 16, 2006 12:01
To: isalist@xxxxxxxxxxxxx
Subject: [isalist] Re: Network Design and defense...

http://www.ISAserver.org
-------------------------------------------------------
  
Speaking or horkage, how did things go with Fast Eddy yesterday?

Thomas W Shinder, M.D.
Site: www.isaserver.org
Blog: http://blogs.isaserver.org/shinder/
Book: http://tinyurl.com/3xqb7
MVP -- ISA Firewalls

 

> -----Original Message-----
> From: isalist-bounce@xxxxxxxxxxxxx
> [mailto:isalist-bounce@xxxxxxxxxxxxx] On Behalf Of Jim Harrison
> Sent: Wednesday, August 16, 2006 1:43 PM
> To: isalist@xxxxxxxxxxxxx
> Subject: [isalist] Re: Network Design and defense...
> 
> http://www.ISAserver.org
> -------------------------------------------------------
>   
> If you say it repeatedly, someone is likely to ask you about your 
> hairballs, too.
> 
> -------------------------------------------------------
>    Jim Harrison
>    MCP(NT4, W2K), A+, Network+, PCG
>    http://isaserver.org/Jim_Harrison/
>    http://isatools.org
>    Read the help / books / articles!
> -------------------------------------------------------
>  
> 
> -----Original Message-----
> From: isalist-bounce@xxxxxxxxxxxxx
> [mailto:isalist-bounce@xxxxxxxxxxxxx] On Behalf Of Amy Babinchak
> Sent: Wednesday, August 16, 2006 11:18
> To: isalist@xxxxxxxxxxxxx
> Subject: [isalist] Re: Network Design and defense...
> 
> Horks isn't listed. I think you are called to add it to the 
> dictionary.
> 
>  
> 
> 1. Hork
> 
> to steal something, though not usually applicable to shoplifting or 
> grand theft.
> 
> I turned around for five minutes and someone horked my pepsi from the 
> fridge at work.
> 
>  
> 
> 2. Hork
> 
>  
> 
> To vomit.
> The summoning of phlegm, in preparation for spitting.
> 
>  
> 
>  
> 
> One would assume then that egress filtering causes you to either to 
> out and steal something or spit up on your keyboard.
> 
>  
> 
> Amy
> 
>  
> 
>  
> 
> ________________________________
> 
> From: isalist-bounce@xxxxxxxxxxxxx
> [mailto:isalist-bounce@xxxxxxxxxxxxx] On Behalf Of Thomas W Shinder
> Sent: Wednesday, August 16, 2006 1:14 PM
> To: isalist@xxxxxxxxxxxxx
> Subject: [isalist] Re: Network Design and defense...
> 
>  
> 
> It really horks me when I hear the term "egress" filtering. 
> Always makes me think the commenator is a dolt because of the P.T. 
> Barnum association with "this way to the egress" ;))
> 
>  
> 
> Thomas W Shinder, M.D.
> Site: www.isaserver.org <http://www.isaserver.org/>
> Blog: http://blogs.isaserver.org/shinder/
> Book: http://tinyurl.com/3xqb7
> MVP -- ISA Firewalls
> 
>  
> 
>        
> 
>       
> ________________________________
> 
> 
>       From: isalist-bounce@xxxxxxxxxxxxx
> [mailto:isalist-bounce@xxxxxxxxxxxxx] On Behalf Of Ball, Dan
>       Sent: Wednesday, August 16, 2006 11:49 AM
>       To: isalist@xxxxxxxxxxxxx
>       Subject: [isalist] Network Design and defense...
> 
>       A tough subject to cover without ticking off one group or another...
> 
>        
> 
>       
> http://www.windowsecurity.com/articles/Network-design-defense.html
> 
>        
> 
>        
> 
> 
> All mail to and from this domain is GFI-scanned.
> 
> ------------------------------------------------------
> List Archives: //www.freelists.org/archives/isalist/
> ISA Server Newsletter: http://www.isaserver.org/pages/newsletter.asp
> ISA Server Articles and Tutorials: 
> http://www.isaserver.org/articles_tutorials/
> ISA Server Blogs: http://blogs.isaserver.org/
> ------------------------------------------------------
> Visit TechGenix.com for more information about our other sites:
> http://www.techgenix.com
> ------------------------------------------------------
> To unsubscribe visit http://www.isaserver.org/pages/isalist.asp
> Report abuse to listadmin@xxxxxxxxxxxxx
> 
> 
> 
------------------------------------------------------
List Archives: //www.freelists.org/archives/isalist/
ISA Server Newsletter: http://www.isaserver.org/pages/newsletter.asp
ISA Server Articles and Tutorials: http://www.isaserver.org/articles_tutorials/
ISA Server Blogs: http://blogs.isaserver.org/
------------------------------------------------------
Visit TechGenix.com for more information about our other sites:
http://www.techgenix.com
------------------------------------------------------
To unsubscribe visit http://www.isaserver.org/pages/isalist.asp
Report abuse to listadmin@xxxxxxxxxxxxx 


All mail to and from this domain is GFI-scanned.

------------------------------------------------------
List Archives: //www.freelists.org/archives/isalist/
ISA Server Newsletter: http://www.isaserver.org/pages/newsletter.asp
ISA Server Articles and Tutorials: http://www.isaserver.org/articles_tutorials/
ISA Server Blogs: http://blogs.isaserver.org/
------------------------------------------------------
Visit TechGenix.com for more information about our other sites:
http://www.techgenix.com
------------------------------------------------------
To unsubscribe visit http://www.isaserver.org/pages/isalist.asp
Report abuse to listadmin@xxxxxxxxxxxxx

Other related posts: