Could someone explain to me what could happen and or how if Telnet is used to 
bypass control if it is left on a unix firewall computer. I know what should not 
be on a firewall computer, I just do not always know why, I am an auditor trying 
to learn. I want to sound semi intelligent when I give this line of reasoning 
out to the security people about telnet and all the other protocols that are not 
or should being used. 

[EMAIL PROTECTED]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to