The book is called "Counter Hack Reloaded: A Step-by-Step Guide to
Computer Attacks and Effective Defenses (2nd Edition)" -
http://www.amazon.com/Counter-Hack-Reloaded-Step-Step/dp/0131481045/ref=pd_bb
s_1?ie=UTF8&s=books&qid=1206284032&sr=8-1

The author makes several references to "proxy firewalls" and implies
they are more secure than "traditional" firewalls because they ignore
typical reconnaissance, probing attempts like nmap, etc. because they
function at the application layer.

Ed

On Sat, Mar 22, 2008 at 7:38 AM, Lars Noodin <[EMAIL PROTECTED]>
wrote:
> Ed Flecko wrote:
>  > I'm reading a book on network security and it mentions "proxy
>  > firewalls" ... are there other "proxy firewalls" the
>  > author is referring to?
>
>  Which book?  Title, author, ISBN would help.  Or send a link to a review.
>
>
>  > As a matter of curiosity, has anyone ran an nmap scan against an
>  > OpenBSD box with Squid? What did the scan results indicate?
>
>  The results depend entirely on how you have Squid set up and how PF is
>  configured.
>
>  Regards,
>  -Lars

Reply via email to