Actually those 2 lines are my full set of firewall rules.  Just waiting
for someone to show how they can be breached before I go for a more
complex setup ;-)

Reply via email to