A new security hole for IE 5, 5.5, & 6 is based on the Gopher protocol. All
that needs to happen is a user connects to the Gopher server and the system
can be exploited.
Question: How do I block the Gopher protocol? I understand it uses port 70
for TCP and UDP.

Thanks

Don Cobb



---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
To subscribe to the digest version first unsubscribe, then
 e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
Archive of the last 1000 messages:
 http://www.mail-archive.com/[email protected]

Reply via email to