Well, for better understanding you can for example read the Firewall piercing found in www.linuxdoc.org or something like that. I'm not pointing you out to some stupid hacker sites, they are usually full of crap. (Maybe this guy is testing he's network??) ;) Theres plenty of keys around those. Learn all about routers n firewalls etc etc, and think and check about currently used network configuration about how everything is connected between themselfes and what type of equipment is being used. These things always depends on so many other things. ;)
Regards:Antti. -----Original Message----- From: Meritt James [mailto:[EMAIL PROTECTED]] Sent: 2. tammikuuta 2002 22:32 To: Michael Watson Cc: [EMAIL PROTECTED] Subject: Re: firewalls That sort of would defeat the purpose, wouldn't it? Michael Watson wrote: > > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > happy new year everyone! > > i was wondering if anyone could direct me to some detailed > information on bypassing firewalls. thanks. > > -----BEGIN PGP SIGNATURE----- > Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com> > > iQA/AwUBPC9uba1t3nvSFCbREQJgygCggsnJdmXXsMDa18vWwxnxZrHgDRIAoKgQ > mFpEn5eHc6gEECqR/LECnIUL > =a6bh > -----END PGP SIGNATURE----- -- James W. Meritt CISSP, CISA Booz | Allen | Hamilton phone: (410) 684-6566 ########################################### This message has been scanned by F-Secure Anti-Virus for Microsoft Exchange.