anomit
In the zone
This is an article by Meera Venkipuram of Digit. Read it here.
Some excerpts:
sic....
Now see the contradiction. If any bot/malware/spyware gets hold of the end user computer, whats the use of Firewall authentication at every step?
Thats how viruses and spywares get entry into company netwroks, thorugh a trusted machine. Same as the old rlogin exploits.
Not a very enlightening article.
Some excerpts:
Users access a remote server from their machines (with an SQL backend) and use PPTP (point-to-point tunnelling protocol) to access the server. However, firewall authentication is required at each and every stage."
sic....
After all, a network is as vulnerable as it's weakest link; the link, which most virus writers and spambots exploit the end user.
Now see the contradiction. If any bot/malware/spyware gets hold of the end user computer, whats the use of Firewall authentication at every step?
Thats how viruses and spywares get entry into company netwroks, thorugh a trusted machine. Same as the old rlogin exploits.
Not a very enlightening article.