On Thu, 20 Dec 2001, Steven Bonici wrote:
[SNIP]
>
> I haven't contacted them yet, I thought I would ask here first. Is there
> any documentation or white papers into how this actually works and what can
> be done to protect the machine? Does anyone have any insight into WebEx? I
> am really curious as to how easy this is. I know once you go to the WebEx
> web site you need to agree and "allow" someone to actually connect, but it
> just seems way too easy.
>
Just don't install their trojan <smile>. This is basically what you are
doing, installing their application that simulates what many trojans do,
give unlimited access to the system.
Thanks,
Ron DuFresne
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"Cutting the space budget really restores my faith in humanity. It
eliminates dreams, goals, and ideals and lets us get straight to the
business of hate, debauchery, and self-annihilation." -- Johnny Hart
***testing, only testing, and damn good at it too!***
OK, so you're a Ph.D. Just don't touch anything.
_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls