> No, his machine is on a NAT based network. That means you can have 500 > machines on the inside but on the outside it only appears as one machine. So > if you installed a Trojan or "remote control" software on one of those 500 > machines you couldn't connect with it. All the 'hacker' would be able to see > is the external node. That is why it is hard to understand, you MUST have > something to bridge the gap between the internal and external network, like > a exploit in some software that bridges that gap in normal operations, such > as the e-mail server, web-server, software that is on the external node etc > etc. I seriously doubt his machine wasn't going though the NAT interface and > that is why it leaves questions.
Read about Windows VPN... http://www.microsoft.com/technet/treeview/default.asp?url=/technet/columns/profwin/pw0201.asp "From the users perspective, the VPN is a point-to-point connection between the users computer and a corporate server." It makes no difference if the client is behind a NAT router or not. Once a VPN network connection is created, the client and the remote PC operate as though they had their own private LAN. Jeffrey "botman" Broome _______________________________________________ To unsubscribe, edit your list preferences, or view the list archives, please visit: http://list.valvesoftware.com/mailman/listinfo/hlcoders