This is an article by Meera Venkipuram of Digit. Read it here. Some excerpts: sic.... Now see the contradiction. If any bot/malware/spyware gets hold of the end user computer, whats the use of Firewall authentication at every step? Thats how viruses and spywares get entry into company netwroks, thorugh a trusted machine. Same as the old rlogin exploits. Not a very enlightening article.