Michael Torrie wrote: > Same thing. Actually I should add that it can't be a man-in-the-middle attack because it is not transparent (ie he has to manually browse to the proxy page). And no one is attacking anyone.
-------------------- BYU Unix Users Group http://uug.byu.edu/ The opinions expressed in this message are the responsibility of their author. They are not endorsed by BYU, the BYU CS Department or BYU-UUG. ___________________________________________________________________ List Info (unsubscribe here): http://uug.byu.edu/mailman/listinfo/uug-list