You have to forgive me with the following questions, as I am not sure if
this is the right group.

We have been asked by one of our software vendors to allow them to use WebEx
to take control of one of our servers.  They explained to me that all I need
to do is to install a "plug-in" and they can take control of the server
through a web browser.  We staged a test with a test server, and they came
right in and took control.  Isn't way too easy?  

I haven't contacted them yet, I thought I would ask here first.  Is there
any documentation or white papers into how this actually works and what can
be done to protect the machine?  Does anyone have any insight into WebEx?  I
am really curious as to how easy this is.  I know once you go to the WebEx
web site you need to agree and "allow" someone to actually connect, but it
just seems way too easy.

I know that websites can grab information from your browser, but again I
would love to know "how" and all this seems to be connected in some way.  I
downloaded a copy of "pcaudit.exe" (by Internet Security Alliance), and that
just goes to prove how vulnerable one is.

Any information would be greatly appreciated.
Thanks - Steven
_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls

Reply via email to