VPN is also available for more advanced security such as encryption and 
endpoint verification.

Joshua

On Sep 7, 2011, at 7:41 PM, chr...@techspecs.com wrote:

> Hi,
> 
>   Suppose 0mq is used in a commercial product and is released and is used
> by the community. Now, a hacker discovers that 0mq is being used and
> tries to get inside by imitating the protocol somehow. How to discover
> this (besides segfault)? Or worse still, the hacker simply wants to
> bring down the server and sends an empty string across REP/REQ or
> something like that. I realize iptables can be used to prevent
> unauthorized IP addresses from accessing a server but what about IP
> address that are initially authorized but turn out to be rogue by
> persons lacking social etiquette?
> 
> Best,
>  Chris
> 
> 
> _______________________________________________
> zeromq-dev mailing list
> zeromq-dev@lists.zeromq.org
> http://lists.zeromq.org/mailman/listinfo/zeromq-dev

_______________________________________________
zeromq-dev mailing list
zeromq-dev@lists.zeromq.org
http://lists.zeromq.org/mailman/listinfo/zeromq-dev

Reply via email to