[linux-elitists] Pompous Top 10 List

Seth David Schoen schoen@loyalty.org
Thu Jun 7 13:13:08 PDT 2001

Don Marti writes:

> the Model Rocketry Safety Code
> of Host-based Security

That would be fun to write.

Here's the starting point:


"I will use only network-layer routers in operating networks for the
benefit of other users, unless they have specifically requested
otherwise.  I will not attempt to modify the payload of any packet
from the design originally specified by the user's client software.
I will not interpret users' communications at a higher protocol

"I will discard all packets with an invalid source or destination
address, but I will never discard a packet merely because I do not
understand a protocol it contains."

Seth David Schoen <schoen@loyalty.org>  | And do not say, I will study when I
Temp.  http://www.loyalty.org/~schoen/  | have leisure; for perhaps you will
down:  http://www.loyalty.org/   (CAF)  | not have leisure.  -- Pirke Avot 2:5

More information about the linux-elitists mailing list