On Thu, 20 Dec 2001, Steven Bonici wrote:

        [SNIP]

> 
> I haven't contacted them yet, I thought I would ask here first.  Is there
> any documentation or white papers into how this actually works and what can
> be done to protect the machine?  Does anyone have any insight into WebEx?  I
> am really curious as to how easy this is.  I know once you go to the WebEx
> web site you need to agree and "allow" someone to actually connect, but it
> just seems way too easy.
> 


Just don't install their trojan <smile>.  This is basically what you are
doing, installing their application that simulates what many trojans do,
give unlimited access to the system.

Thanks,

Ron DuFresne
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"Cutting the space budget really restores my faith in humanity.  It
eliminates dreams, goals, and ideals and lets us get straight to the
business of hate, debauchery, and self-annihilation." -- Johnny Hart
        ***testing, only testing, and damn good at it too!***

OK, so you're a Ph.D.  Just don't touch anything.

_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls

Reply via email to