Do you specifically mean how to impersonate other protocols so as to avoid SPI (stateful packet inspection, I assume) firewalls?  Or is there some more “correct” way, such as UPnP?

 

-david

 


From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Lemon Obrien
Sent: Monday, May 29, 2006 10:29 PM
To: Peer-to-peer development.
Subject: [p2p-hackers] I hate SPI Firewalls

 

does anyone know where i can obtain easy documentation on how to punch and maintain a hole through SPI; any helpful hints?

 

i'm having problems with Netgear Routers.

 

thanks.



You don't get no juice unless you squeeze
Lemon Obrien, the Third.

_______________________________________________
p2p-hackers mailing list
[email protected]
http://zgp.org/mailman/listinfo/p2p-hackers
_______________________________________________
Here is a web page listing P2P Conferences:
http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences

Reply via email to