John Miskinis writes:
> So should I persue trying to get my system to authenticate my ISP's
> connection to my machine?

No.  They won't do it.

> Or is this not typically used for systems that connect TO an ISP?

Right.  You called them, so you know who they are.

> I'm hoping that it's OK to live without out it, and not open my system up
> to possible intrusion.

There is no risk.  It's how things are normally done.
-- 
John Hasler                This posting is in the public domain.
[EMAIL PROTECTED]            Do with it what you will.
Dancing Horse Hill         Make money from it if you can; I don't mind.
Elmwood, Wisconsin         Do not send email advertisements to this address.

Reply via email to