[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Have they stopped teaching Defense in Depth?
----- Original Message -----
> From: "Jimmy Hess" <mysidia at gmail.com>
> Or, the attack is against a legitimate user's outbound connection, for example:
> a user behind the firewall connects to a web site, a vulnerability
> in their browser is exploited
> to install a trojan -- the trojan tunnels to the attacker over an
> outgoing port that is allowed on the firewall.
Oh, certainly; I have lots of web browsers running on my servers.
All The World Is Not A Workstation, guys.
Cheers,
-- jra
--
Jay R. Ashworth Baylink jra at baylink.com
Designer The Things I Think RFC 2100
Ashworth & Associates http://baylink.pitas.com 2000 Land Rover DII
St Petersburg FL USA http://photo.imageinc.us +1 727 647 1274