home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!destroyer!gumby!wmichgw!overberger
- From: overberger@gw.wmich.edu
- Newsgroups: comp.protocols.tcp-ip.ibmpc
- Subject: TCP/IP security and Public Labs
- Message-ID: <1992Dec18.135413.7034@gw.wmich.edu>
- Date: 18 Dec 92 13:54:13 EST
- Organization: Western Michigan University
- Lines: 8
-
- Perhaps this is a frequently asked question, but here it is anyway.
- As computing sites place (such as a university like ours) PC's and
- Mac's directly on network backbones, what types of techniques are
- employed to prevent a user from loading their own Telnet executable
- and config file with any IP number and Telnet off site without
- any user verification ? A router on every station would do it but
- at quite a cost. Any ideas are welcome.
-
-