My supervisor reprimanded me for testing two utilities: A full-featured commercial port scanner and an e-mail verifier that verifies e-mail addresses by connecting to e-mail servers via Simple Mail Transfer Protocol. The supervisor said using these utilities exposes us to attacks by hackers. My supervisor reprimanded me for testing two utilities: A full-featured commercial port scanner and an e-mail verifier that verifies e-mail addresses by connecting to e-mail servers via Simple Mail Transfer Protocol. The supervisor said using these utilities exposes us to attacks by hackers.I know that port scanning might irritate other administrators (and could be illegal?), but how does it expose us to an attack? Same for the e-mail product: How does connecting to an e-mail server via SMTP expose us? The rationale I was given is roughly, “these hackers can do anything, they have all sorts of tricks – you just don’t understand.” That level of paranoia defies common sense. What do you think?If software talks to the network then there is always the possibility that it is covertly communicating with some outside entity. One should only install software from trusted sources and even then only carefully. Trusting commercial and open source sites to distribute honest software is less of a danger to system administrators than not knowing or simply ignoring network security policy regarding Internet downloads and unauthorized software installation. Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Cloud Computing Networking Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe