Michael Torrie wrote:
> Same thing.

Actually I should add that it can't be a man-in-the-middle attack
because it is not transparent (ie he has to manually browse to the proxy
page).  And no one is attacking anyone.



--------------------
BYU Unix Users Group 
http://uug.byu.edu/ 

The opinions expressed in this message are the responsibility of their
author.  They are not endorsed by BYU, the BYU CS Department or BYU-UUG. 
___________________________________________________________________
List Info (unsubscribe here): http://uug.byu.edu/mailman/listinfo/uug-list

Reply via email to