Hello all:
I have been told that it is possible to identify a Checkpoint Firewall's
operating system type, build and version type from the outside by examining
banners and using various fingerprinting techniques. How can a Checkpoint
firewall be protected against this vulnerability?
Andy
================================================================================
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
================================================================================