Ron,
I agree 100%. I would be asking WHY are they in need of this access? If they need access to a server, I would set up one that does not give them ANY access to my network. Then I can post information on it if needed. Also give them a log in not full access, that way (Company) keeps ROOT access... S *********** REPLY SEPARATOR *********** On 12/20/2001 at 12:39 PM Ron DuFresne wrote: >On Thu, 20 Dec 2001, Steven Bonici wrote: > > [SNIP] > >> >> I haven't contacted them yet, I thought I would ask here first. Is there >> any documentation or white papers into how this actually works and what >can >> be done to protect the machine? Does anyone have any insight into >WebEx? I >> am really curious as to how easy this is. I know once you go to the >WebEx >> web site you need to agree and "allow" someone to actually connect, but >it >> just seems way too easy. >> > > >Just don't install their trojan <smile>. This is basically what you are >doing, installing their application that simulates what many trojans do, >give unlimited access to the system. > >Thanks, > >Ron DuFresne >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >"Cutting the space budget really restores my faith in humanity. It >eliminates dreams, goals, and ideals and lets us get straight to the >business of hate, debauchery, and self-annihilation." -- Johnny Hart > ***testing, only testing, and damn good at it too!*** > >OK, so you're a Ph.D. Just don't touch anything. > >_______________________________________________ >Firewalls mailing list >[EMAIL PROTECTED] >http://lists.gnac.net/mailman/listinfo/firewalls _______________________________________________ Firewalls mailing list [EMAIL PROTECTED] http://lists.gnac.net/mailman/listinfo/firewalls
