Ron,

I agree 100%.  I would be asking WHY are they in need of this
access?  If they need access to a server, I would set up one that
does not give them ANY access to my network.  Then I can post
information on it if needed.  Also give them a log in not full access,
that way (Company) keeps ROOT access...

S

*********** REPLY SEPARATOR  ***********

On 12/20/2001 at 12:39 PM Ron DuFresne wrote:

>On Thu, 20 Dec 2001, Steven Bonici wrote:
>
>       [SNIP]
>
>>
>> I haven't contacted them yet, I thought I would ask here first.  Is there
>> any documentation or white papers into how this actually works and what
>can
>> be done to protect the machine?  Does anyone have any insight into
>WebEx?  I
>> am really curious as to how easy this is.  I know once you go to the
>WebEx
>> web site you need to agree and "allow" someone to actually connect, but
>it
>> just seems way too easy.
>>
>
>
>Just don't install their trojan <smile>.  This is basically what you are
>doing, installing their application that simulates what many trojans do,
>give unlimited access to the system.
>
>Thanks,
>
>Ron DuFresne
>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>"Cutting the space budget really restores my faith in humanity.  It
>eliminates dreams, goals, and ideals and lets us get straight to the
>business of hate, debauchery, and self-annihilation." -- Johnny Hart
>       ***testing, only testing, and damn good at it too!***
>
>OK, so you're a Ph.D.  Just don't touch anything.
>
>_______________________________________________
>Firewalls mailing list
>[EMAIL PROTECTED]
>http://lists.gnac.net/mailman/listinfo/firewalls



_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls

Reply via email to