Remember the note I put up a few days ago asking about ports used by trojans because I wanted to build a firewall rule blocking them? I received a number of notes that I was thinking backwards -- that I should build the rules to block everything except that which was specifically required. Unfortunately, I was in a situation where I couldn't do that, and it bothered me as much as it bothered some of you. Well, things change. Now I can build the rules the right way. Just thought you'd all like to know.... ___________________________________________________________ Steve Riley Microsoft Telecommunications Consulting in Denver, Colorado e-mail: mailto:[EMAIL PROTECTED] call/page: +1 303 521-4129 (cellular) SMS: mailto:[EMAIL PROTECTED] (100 characters) For MS Internet info see http://www.microsoft.com/isn/ Applying computer technology is simply finding the right wrench to pound in the correct screw. - [To unsubscribe, send mail to [EMAIL PROTECTED] with "unsubscribe firewalls" in the body of the message.]
