|
Do you specifically mean how to impersonate
other protocols so as to avoid SPI (stateful packet inspection, I assume)
firewalls? Or is there some more “correct” way, such as UPnP? -david From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On
Behalf Of Lemon Obrien does anyone know where i can obtain easy documentation on how to punch
and maintain a hole through SPI; any helpful hints? i'm having problems with Netgear Routers. thanks.
|
_______________________________________________ p2p-hackers mailing list [email protected] http://zgp.org/mailman/listinfo/p2p-hackers _______________________________________________ Here is a web page listing P2P Conferences: http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences
