<div dir="ltr"><div>For anyone doubting that you need to seek official approval before starting to test things...</div><div><br></div><a href="https://en.wikipedia.org/wiki/Randal_L._Schwartz#Intel_case">https://en.wikipedia.org/wiki/Randal_L._Schwartz#Intel_case</a></div><div class="gmail_extra"><br><div class="gmail_quote">On 1 December 2016 at 09:52, Bob Purdon <span dir="ltr"><<a href="mailto:bobp@purdon.id.au" target="_blank">bobp@purdon.id.au</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div lang="EN-AU" link="blue" vlink="purple"><div class="m_-7918244599301168407WordSection1"><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"><u></u> <u></u></span></p><div><div><div><p class="m_-7918244599301168407MsoListParagraph" style="margin-bottom:12.0pt"><u></u><span style="font-size:11.0pt;font-family:Wingdings"><span>Ø<span style="font:7.0pt "Times New Roman""> </span></span></span><u></u>Be aware that running penetration tools just to see what happens can lead to spectacular outages and questions of who authorised this.<u></u><u></u></p></div></div></div><div><p class="MsoNormal">Absolutely – I have seen something as simple as an nmap port scan tickle a latent bug and cause widespread service interruptions.<u></u><u></u></p></div></div></div><br>______________________________<wbr>_________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" rel="noreferrer" target="_blank">http://lists.ausnog.net/<wbr>mailman/listinfo/ausnog</a><br>
<br></blockquote></div><br></div>