One thing you might want to mention, is that people who do this in large corporations may want to have two firewall/routers between the lab, and the corporate firewall.
The first one is configurable and under control of the hack lab staff. The second is controlled by corporate IT. Think of malware being discovered in the corporation, and the hacklab gets blamed for causing it. The second router protects both parties. The only way the hacklab can infect the corporation is if it bypassed the IT-configured firewall, which means IT screwed up and is therefore responsible. _______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
