Could someone explain to me what could happen and or how if Telnet is used to
bypass control if it is left on a unix firewall computer. I know what should not
be on a firewall computer, I just do not always know why, I am an auditor trying
to learn. I want to sound semi intelligent when I give this line of reasoning
out to the security people about telnet and all the other protocols that are not
or should being used.
[EMAIL PROTECTED]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]