A new security hole for IE 5, 5.5, & 6 is based on the Gopher protocol. All that needs to happen is a user connects to the Gopher server and the system can be exploited. Question: How do I block the Gopher protocol? I understand it uses port 70 for TCP and UDP.
Thanks Don Cobb --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] To subscribe to the digest version first unsubscribe, then e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED] Archive of the last 1000 messages: http://www.mail-archive.com/[email protected]
