hi,
    FWIW yeah parsed this some time ago. It seems to me that there was a IIR read
somewhere that analysed the real merits of such a system. They found that
the value of such a system on a initial attack was good. BUT.. since the workable
ip space was limited one could play hide && seek with its usefulness quickly
diminished. As you know since many attacks can be performed in parallel this
again diminishes its real value on a descending curve. There was one technology
recall scanning in which a physical 'air gap' was created so that client host
only P 2 P would be connected at any one time. Seemed simularly useful maybe more.
When they say impenetrable well you know they are referring to their
marketing propaganda. (Other than that will are "WE" to take their word for it?)
Given enough time, patience, desire, and a little skill well anything is penetrable.
Well there is my 2 cents.

Best Regards
[EMAIL PROTECTED]

_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls

Reply via email to