Remember the note I put up a few days ago asking about ports used by trojans
because I wanted to build a firewall rule blocking them? I received a number
of notes that I was thinking backwards -- that I should build the rules to
block everything except that which was specifically required. Unfortunately,
I was in a situation where I couldn't do that, and it bothered me as much as
it bothered some of you.

Well, things change. Now I can build the rules the right way. Just thought
you'd all like to know....

___________________________________________________________
Steve Riley
Microsoft Telecommunications Consulting in Denver, Colorado
   e-mail: mailto:[EMAIL PROTECTED]
   call/page: +1 303 521-4129 (cellular)
   SMS: mailto:[EMAIL PROTECTED] (100 characters)
   For MS Internet info see http://www.microsoft.com/isn/
Applying computer technology is simply finding the right wrench to pound in
the correct screw.

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to