[linux-elitists] Pompous Top 10 List
Seth David Schoen
Thu Jun 7 13:13:08 PDT 2001
Don Marti writes:
> the Model Rocketry Safety Code
> of Host-based Security
That would be fun to write.
Here's the starting point:
"I will use only network-layer routers in operating networks for the
benefit of other users, unless they have specifically requested
otherwise. I will not attempt to modify the payload of any packet
from the design originally specified by the user's client software.
I will not interpret users' communications at a higher protocol
"I will discard all packets with an invalid source or destination
address, but I will never discard a packet merely because I do not
understand a protocol it contains."
Seth David Schoen <email@example.com> | And do not say, I will study when I
Temp. http://www.loyalty.org/~schoen/ | have leisure; for perhaps you will
down: http://www.loyalty.org/ (CAF) | not have leisure. -- Pirke Avot 2:5
More information about the linux-elitists