Beefy Boxes and Bandwidth Generously Provided by pair Networks
There's more than one way to do things
 
PerlMonks  

Re: Help With Custom War Dialer

by Mr. Muskrat (Canon)
on Mar 11, 2004 at 05:36 UTC ( #335722=note: print w/replies, xml ) Need Help??


in reply to Help With Custom War Dialer

I was given the task of finding all modems at my companies location.

Did someone neglect to keep an accurate inventory of equipment? Or is there reason to believe that someone is using their personal modem?

Replies are listed 'Best First'.
Re: Re: Help With Custom War Dialer
by MidLifeXis (Monsignor) on Mar 11, 2004 at 18:05 UTC

    ... or at < $20.00 USD are people expensing them and hooking them up themselves, or are people running their phone cord from the wall jack into the back of the computer they just ordered, and then to their phone.

    There are many validcommon ways this can happen. Usually something like this is used to back up a policy decision.

    --MidLifeXis

Re: Re: Help With Custom War Dialer
by Perimus (Novice) on Mar 11, 2004 at 19:26 UTC
    More likely that a security manager is wondering how many potenteial PC-ANYWHERE contact points might exist behind their firewall
      WiFi Access points are far more of an issue these days. For a trivial amount a manager can have the printer where he wants and not even have to call the IT people. Bang goes your security policy.

      War walking is far easier and a lot harder to trace. With war dialing the phone company will have a record of the who made the call and then it is just a case of back tracking. True it may be many steps but there is probably some sort of trail.

      Unless a network is running intrusion detection finding a new node on the network will be hard and if the person knows enough to hide what they are doing almost impossible.

      Just a couple of paranoid thoughts
      UnderMine

Log In?
Username:
Password:

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://335722]
help
Chatterbox?
[karlgoethebier]: Discipulus: No. See https://en. wikipedia.org/ wiki/Tribe_( Native_American)
[karlgoethebier]: They took Unix from some aliens
[marioroy]: Perl is so powerful that it can poll 40 metrics from 20 million devices in 40 minutes using 4 nodes only.
[karlgoethebier]: http://www. uncoveror.com/ aliens.htm
[Lady_Aleena]: marioroy, I can't decide whether or not to move my RolePlaying:: Random:: modules to just Random::. I'm not as sophisticated as most here.
[marioroy]: Naming things can be difficult, sometimes more so that the actual code :)
[karlgoethebier]: Lady_Aleena: You need to jump to some conclusion
[Lady_Aleena]: And what would I rename RolePlaying/Random .pm to if I move all the RolePlaying/Random modules to just Random? Random/Util.pm Random/Base.pm, maybe lowercase the file name to indicate it is a bit different? I don't know yet.
[marioroy]: What does Random do?
[karlgoethebier]: https://www. youtube.com/watch? v=42WNHGr1jGI

How do I use this? | Other CB clients
Other Users?
Others rifling through the Monastery: (9)
As of 2017-05-29 08:56 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?