Does anyone have any information on, or pointers to resources documenting successful attacks on "good" (can't be to good, huh?) firewall implementations? I suppose info. on attacks on obviously bad implementations would be of interest as well (a lot to learn from other peoples mistakes, and possibily something to laugh about). Regards, Per - [To unsubscribe, send mail to [EMAIL PROTECTED] with "unsubscribe firewalls" in the body of the message.]
