Well ‘no benefits’ is a bit of a stretch.
Well ‘no benefits’ is a bit of a stretch.
Isn’t that just a different way of answering the question though? Do you think 60 years is the answer but don’t want to say that?
Because Democrats want someone who will run the country and Republicans just want someone who will maintain their minority control. We are concerned for the country, they are scared for their very existence and self reflection itself is dangerous for their existence. Basically self reflection is necessary for what Democrats want to do, and it fatal for what Republicans want. So we do it, and Republicans avoid it at all costs. We get a Kamala who we hold to a high standard, they get a Trump who can punch them in the face and they’ll still support him because of the party.
A benign scan could just be looking for an ftp server to connect to or a repeater or relay server of some sort. There are plenty of open services people make available for free and the fact that you would consider it an attack it doesn’t make it one.
At minimum you could be alerted to look for someone attempting to connect to your ftp server with a single basic anonymous authentication vs someone flooding that port with known malicious software attacks, and block the latter across your entire network and effectively ignore the former. Really it seems like you’re advertising your lack of imagination in this context than a legitimate lack of possible uses for spoofing open ports.
That’s probably a majority of the point. Falsely report that some interesting ports are open and he’ll spend time on them and potentially trigger alerts or blocks.
Fake open ports aren’t something a normal user would bother with or understand, but with all the tools available in the nefarious side, it makes sense to have options that make their job harder if you’re willing to use them.
Maybe what you’re referring to is along the lines of a port being open but the software on the other side of it not sending acknowledging responses?
At a guess, you might tell the difference between some benign scan and an attempt to actually take advantage of the port, perhaps to use as a trigger to automatically ban an ip address? or a way to divert malicious resources to an easy looking target so they are less available in other areas?
The difference between someone scanning for open ports and someone attacking a port they find open seems significant enough to at least track and watch for patterns… Whether that’s useful for the majority of users or not is rarely why a feature is implemented.
Yes, ADHD symptoms are only problematic when combined with time. If you are able to separate ADHD symptoms from time, they won’t even occur.
not to justify bad behavior, but your points are rather off base. Thinking you’re superior to something doesn’t mean you hate it…One might consider themselves superior to plants and not hate them. One might consider Ford superior to Chevy and not hate Chevy. A woman can be misogynistic and consider males superior without hating females. Just because the 2 other points often come along for the ride doesn’t mean they are part of the definition and shouldn’t be asked.
Sounds like a self correcting problem? Maybe just replace the ones that protect traffic below them…
Basically ‘duty cycle’…same reason electric heaters all put out 1500W but ones for larger rooms are ‘larger’. Big or small, they both put out 1500W, but the small ones can only do it for a few minutes at a time before having to cool off, while the larger ones can run for longer and heat up a big room more quickly.