Comment Re:Treat Them as Garbage! (Score 1) 485
ha, you got to be kidding, one scratch or a bad player and it is trash. I hope you are not an sys admin for any company.
May be you can patent - triple mouse clicks to open porn.
There never existed a security system which can't be broken. As security systems evolve, the break-ins into the system too. An intelligent animal called a human creates a security system, why it can't be broken by the same but another instance of this intelligent human animal? Agreed, different instances of this human have different level of intelligence yet there will always be an human instance more intelligent than the creator of the security system. We sometimes call this "Theory of natural progression". It is a matter of time and evolution when this too will be broken.
Ans: Only another species of animal much more intelligent than an human can create a secure system for the inferior species. For example - we can create a real secure system for a chimp. Therefore, from my point of view security systems are good for only comforting us with a false sense of security.
The nc (or netcat) utility is used for just about anything under the sun involving TCP or UDP. It can open TCP connections, send UDP packets, listen on arbitrary TCP and UDP ports, do port scanning, and deal with both IPv4 and IPv6. Unlike telnet(1), nc scripts nicely, and separates error messages onto standard error instead of sending them to standard output, as telnet(1) does with some.
Common uses include:
simple TCP proxies
shell-script based HTTP clients and servers
network daemon testing
a SOCKS or HTTP ProxyCommand for ssh(1)
and much, much more
Those who can, do; those who can't, write. Those who can't write work for the Bell Labs Record.