OTOH, tools we didn’t have in 1994
Available, working, distributable crypto
No ssh
Firewalls: build it yourself
Stateful inspection had been pondered, but not available
Want to hack a kernel?
IDS, honey pots, and lots of other tools available
Previous slide
Next slide
Back to first slide
View graphic version