Hi With reference to the post-script on your email: Please could you explain exactly what probability you like, that the tools suggested by the good people on the list, might - or - might not try to find weak points in the security of your network. Are you definitely |not| interested in a tool that would invariably try... ? Are you going to discount all tools that would succeed without trying? Are you willing to accept a tool that may succeed? If the tool just made a cup of coffee for everybody, would that be of interest? Oh the possibilities of greyness are limitless... WTFIC Peter (Always found at the extreme middle) On Friday 05 April 2002 8:01 pm, you wrote:
...I am looking for tools that might try to find weak points in the security of my network, what is the best tool out there.
Michael Garabedian Consultant Emergys Corporation 6340 Quadrangle Drive Suite 360 Chapel Hill, NC 27517 408-3385 ext 101 Fax 408-3384 email mikejr@emergyscorp.com website: www.emergys.com
WE DENY THE EARTH PRINCIPLE OF THE THIRD EXCLUDED TERM (THE EXCLUDED MIDDLE, ENUNCIATED BY ARISTOTLE) ACCORDING TO WHICH PROPOSITIONS CAN ONLY BE TRUE OR FALSE. THE WHOLE ONTOLOGY OF TERRESTRIAL THINKERS IS SATURATED WITH EXPRESSIONS LIKE "TO BE," "I AM NOT," "I EXIST," WITHOUT ANY OPTION FOR OTHER FORMS OF DIFFERENT CONTENT. UNLESS YOU YOURSELVES CLARIFY YOUR FORMS OF INFORMATIVE COMMUNICATION, THE PROCESS OF SEEKING THE TRUTH WILL BE VERY LABORIOUS AND SLOW.