In Oz, buy ADSL from our only telco, you gotta use their Alcatel modem.
Accreditation list slowly grows through alternative modems/routers though.
It's young here, this xDSL thing.
But, with few users yet, bandwidth is huge & quick, uploads from boxes
IP addressing for sites nearly impossible, a few ISP's are offering it, but
passthru their systems at bandwidth penalty.
Mebbe sense will shine through mid year ??
ISDN ($$$$'s) still the only way to serve out stuff, so far.
We wait in hope.
> This is a pretty simple matter, really.
> If the ISP provides you with the device in order to facilitate connecting
> you to their service, you can take the implication that it's there to make
> the wires meet. If the ISP provides you with a contract which
> you will not be hacked because they have provided this same device as a
> firewall, then you have a security device, not a device that connects
> If the ISP is taking responsibility for this device, then they have the
> right to secure it from you or anyone else.
> In the event that you want to have control of your own firewall, then you
> simply purchase one and put it between their device and yours. I don't
> really consider that I have the right to TELL the ISP that they must give
> control of their interconnecting hardware. However, if the ISP fails to
> provide me adequate protection in a reasonable manner, you can take a
> course from there, at least in the US.
> > I'm wondering what opinions you have about ISP that refuse to disclose
> > passwords to owner/users as stated in the url provided by Susan.
> > Is it a good or bad thing ?
> > Any good urls, with insight into this matter
> > Andri
> > > They can hack into our computers, get around our firewalls, and
> > > apparently now can attack our ADSL modems.......
> > > you think two paper cups and string might be secure?
> > > Susan Bradley
> > > The San Diego Supercomputer Center (SDSC) has recently discovered
> > > several vulnerabilities in the Alcatel Speed Touch Asymmetric
> > > Subscriber Line (ADSL) modem. These vulnerabilities are the result
> > > weak authentication and access control policies and exploiting them
> > > will lead to one or more of the following: unauthorized access,
> > > unauthorized monitoring, information leakage, denial of service,
> > > permanent disability of affected devices.
> > > The SDSC has published additional information regarding these
> > > vulnerabilities at
> > > http://security.sdsc.edu/self-help/alcatel/