|
The relevant concepts are as follows, and also apply to Real
Audio.
~~~~~
Epic Audio communicates using UDP packets over the Internet RTF protocol directed to non-privileged ports 2074 through 2076. Firewalls usually block all non-privileged (and hence unknown) port number packets, as they can be used by Mole or Trojan Horse applications. Epic Audio uses a non-privileged port so that, when non-privileged access is allowed, the support of a firewall administrator is not required to install the Epic Audio program. If the student is behind a privileged only firewall they might be able to persuade the system administrator to allow UDP packets, on ports 2074 through 2076, to pass through the firewall in both directions but it’s not likely, nor would we recommend opening such security holes in the firewall. Once there's a non-privileged port through a firewall, any program can transmit anything that’s accessible on your system to any other host on the Internet. Epic Audio is benign, but that may not be the case with other non-privileged programs. ~~~~~ If you'd like additional background information, check http://www.epiclearning.com/instructors/epicaudio.htm#local and http://www.protocols.com/voip/ MCSE Magnet Website [EMAIL PROTECTED] MCThttp://www.epiclearning.com/instructors/ ----- Original Message -----
From: Dave Wreski
> Do you happen to know where there is any information
on the net that explains why ICQ/RA is a risk? Something that I can present to management? |
- firewall identification Interpaul
- Re: firewall identification Paul D. Robertson
- RE: firewall identification Kevin Eberman
- RE: firewall identification Paul D. Robertson
- Re: firewall identification Dave Wreski
- Re: firewall identification MarvL
- Re: firewall identification MarvL
- Re: firewall identification Paul D. Robertson
- Re: firewall identification Jeff Bachtel
