[EMAIL PROTECTED] writes:
I'd like to have further answers: how does winpcap hook NDIS stack?
I mean, would it be easy for any program aware of winpcap on the system to disable it or circumventing it, maybe building IP packets using lower level API calls which winpcap wouldn't be able to recognize?
Sorry.
I forgot the main question! Is there a way, using winpcap, to prevent a packet from being seen from windows TCP/IP stacks? To hide it? To block it?
If it's not so, of course a "real" firewall is not possible.
One might imagine an other way, as answering with a RST packet to all packets sent to filtered ports, but this would not be probably good enough...
thanks,
alfonso


==================================================================
This is the WinPcap users list. It is archived at
http://www.mail-archive.com/[email protected]/

To unsubscribe use mailto: [EMAIL PROTECTED]?body=unsubscribe
==================================================================

Reply via email to