On 7 Apr 99, at 14:04, cbrenton wrote:

> 6) If I compromise the external system, I may be able to install
> sniffer/trojan software which will monitor outbound activities.

  Or, for that matter, to install attractive trojan files (or replace 
legit files) that authorized users will carry past the firewall for me. 
Not good.


David G
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to