If it's either, it's a router considering the steps that need be taken to accomplish the attack and sniff information that the client is sending/receiving from outside the network. But w/e... you are just being flippant now anyway. Enjoy.
-----Original Message----- From: Dave Watts [mailto:[EMAIL PROTECTED] Sent: Tuesday, October 03, 2006 10:44 PM To: CF-Talk Subject: RE: Break it down for n00bs: security problems of non-SSL intrane t? > A MItM attack is more or less making your self the router... > not a proxy. I don't think that's correct. Routers separate networks, and forward traffic from one network to another, not from one host to another. And, for what it's worth, most of the "Mallory" tools I've seen are called proxies. > I never said anything about sending a user to any site other > than the real one. Sorry, I don't know where you get that from. If you send a user to your proxy instead of letting the user communicate directly to the site, you are sending the user to a site other than the real one. Dave Watts, CTO, Fig Leaf Software http://www.figleaf.com/ Fig Leaf Software provides the highest caliber vendor-authorized instruction at our training centers in Washington DC, Atlanta, Chicago, Baltimore, Northern Virginia, or on-site at your location. Visit http://training.figleaf.com/ for more information! ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~| Introducing the Fusion Authority Quarterly Update. 80 pages of hard-hitting, up-to-date ColdFusion information by your peers, delivered to your door four times a year. http://www.fusionauthority.com/quarterly Archive: http://www.houseoffusion.com/groups/CF-Talk/message.cfm/messageid:255312 Subscription: http://www.houseoffusion.com/groups/CF-Talk/subscribe.cfm Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4

