On 9/9/11 4:25 AM, G.W. Haywood wrote:
So what's the problem?

I guess I'd like to see what your Checkpoint firewall rules in your DC look like and read your presentation to your security team justifying connecting your system to unknown systems using a distribution method most better known for software and music pirating for the purpose of uploading AV signatures from your AV vendor, and that this is needed because the vendor actually doesn't have enough bandwidth to do the job right without this torrent method.

dp
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to