> No, his machine is on a NAT based network. That means you can have 500
> machines on the inside but on the outside it only appears as one machine.
So
> if you installed a Trojan or "remote control" software on one of those 500
> machines you couldn't connect with it. All the 'hacker' would be able to
see
> is the external node. That is why it is hard to understand, you MUST have
> something to bridge the gap between the internal and external network,
like
> a exploit in some software that bridges that gap in normal operations,
such
> as the e-mail server, web-server, software that is on the external node
etc
> etc. I seriously doubt his machine wasn't going though the NAT interface
and
> that is why it leaves questions.

Read about Windows VPN...

http://www.microsoft.com/technet/treeview/default.asp?url=/technet/columns/profwin/pw0201.asp

"From the users perspective, the VPN is a point-to-point connection between
the users computer and a corporate server."

It makes no difference if the client is behind a NAT router or not.  Once a
VPN network connection is created, the client and the remote PC operate as
though they had their own private LAN.

Jeffrey "botman" Broome


_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please visit:
http://list.valvesoftware.com/mailman/listinfo/hlcoders

Reply via email to