----- Original Message ----- > From: "Jimmy Hess" <mysi...@gmail.com>
> Or, the attack is against a legitimate user's outbound connection, for > example: > a user behind the firewall connects to a web site, a vulnerability > in their browser is exploited > to install a trojan -- the trojan tunnels to the attacker over an > outgoing port that is allowed on the firewall. Oh, certainly; I have lots of web browsers running on my servers. All The World Is Not A Workstation, guys. Cheers, -- jra -- Jay R. Ashworth Baylink j...@baylink.com Designer The Things I Think RFC 2100 Ashworth & Associates http://baylink.pitas.com 2000 Land Rover DII St Petersburg FL USA http://photo.imageinc.us +1 727 647 1274