Hi,
Note that user takes the value "user@host" given at password prompt
for anonymous access (forgetting any potential dns attacks into remhost)
This allows anyone to smash the stack just with an anonymous access
and a file to download.
(see last published exploits.)
Regards,
Pascal
On Mon, Aug
SecuRemote works with 2 FireWall-1 encryption schemes, FWZ and IKE. Here's
my reading on it. If you use IKE, you MUST deselect "respond to
unauthenticated topology requests." However, if you use FWZ, CheckPoint
recommends that you select "respond to unauthenticated topology requests."
As the previ