On Wed, 2004-05-12 at 22:39, David Kempe wrote:

> With the plethora of spyware around on the average PC, hijacking port 80 
>   connections is a great way to monitor and block them. You can 
> configure legitimate programs to use a proxy (apt for example or even 
> ftp for apt), and illegitimate ones fail silently. For spyware, thats a 
> good thing.
> Robert, we don't all live in a squid-erific world, fact is, hijacking 
> connections is a great way to save bandwidth, monitor useage and filter 
> sites. I love squid, and you do great work, but sometimes I feel like 
> you haven't seen the shit some people suck off the net :)

It sounds like you have argued exactly what Robert is saying.  If you
silently redirect port 80 to the proxy then the spyware is redirected as
well. Robert has argued against this whole setup, for other technical
reasons as well.

-- 
Thanks
KenF
OpenOffice.org developer

-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

Reply via email to