Curt wrote: Unless you're talking about inserting a proxy in-line and manually grabbing the packets and manipulating them at a huge amount of work, you ARE way off-base. There is no malware I know of that would even know what the packets were, muchless re-assemble them into the original document, insert itself, and pass it on. Maybe by 2104...
I don�t know why, but I suddenly recall two statements, one of them famous already: "I think there is a world market for maybe five computers." Thomas Watson, chairman of IBM, 1943 "I'm always in favor of security research, and I have enjoyed following the developments in quantum cryptography. But as a product, it has no future." Bruce Schneier, Crypto-Gram Newsletter December 15, 2003 Cheers, I�igo Koch redsegura.com _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
