Does anyone have any information on, or pointers to resources documenting successful 
attacks on "good" (can't be to good, huh?) firewall implementations? I suppose info. 
on attacks on obviously bad implementations would be of interest as well (a lot to 
learn from other peoples mistakes, and possibily something to laugh about). 

Regards,

Per


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to