You have to forgive me with the following questions, as I am not sure if this is the right group.
We have been asked by one of our software vendors to allow them to use WebEx to take control of one of our servers. They explained to me that all I need to do is to install a "plug-in" and they can take control of the server through a web browser. We staged a test with a test server, and they came right in and took control. Isn't way too easy? I haven't contacted them yet, I thought I would ask here first. Is there any documentation or white papers into how this actually works and what can be done to protect the machine? Does anyone have any insight into WebEx? I am really curious as to how easy this is. I know once you go to the WebEx web site you need to agree and "allow" someone to actually connect, but it just seems way too easy. I know that websites can grab information from your browser, but again I would love to know "how" and all this seems to be connected in some way. I downloaded a copy of "pcaudit.exe" (by Internet Security Alliance), and that just goes to prove how vulnerable one is. Any information would be greatly appreciated. Thanks - Steven _______________________________________________ Firewalls mailing list [EMAIL PROTECTED] http://lists.gnac.net/mailman/listinfo/firewalls
