>>>>> "Jan" == Jan Koum <jkoum @
Jan> Following your analogy:
Jan> I don't trust any one with keys to my house. Even those who
Jan> built it. I better build one on my own and know all "ins and
Jan> outs" in case of fire or other natural disasters. Also, what if
Jan> it rains and roof leaks and people from TIS are not around? You
Jan> better know where to look for that leak, or else it will be a lot
Jan> of water... ;-) Take your pick.
The problem with taking the analogy out to this point is that it won't
hold up because the Gauntlet is a crystal box. You get all of the
source code. You get documentation. You get support.
They don't just give you an "upgrade" and say "here, run these
commands as root, it will run some programs". You've got complete
source so that you can pull it apart, learn from it, and even modify
it if need be.
I use some parts of the FWTK for my own purposes, or for things for my
own company internally. I'll be here to fix it if something goes
wrong, and there are other people here sufficiently clued to be able
to figure out what's happening and fix it if I'm not. However, in
situations where someone wants me to recommend something that their IS
department can run (or if I'm consulting), or that sort of thing, I'll
point 'em to the Gauntlet...
Matt Curtin cmcurtin @
com Megasoft, Inc Chief Scientist
http://www.research.megasoft.com/people/cmcurtin/ I speak only for myself.
Hacker Security Firewall Crypto PGP Privacy Unix Perl Java Internet Intranet