Paul on Thu, 30 Jan 2003 12:41:05 -0500 |
Jeff Abrahamson wrote: What if another computer on the internal network is compromised, allowing it to access your computer? This one is a real stretch: What if a script is executed somehow through e-mail or a Web site which opens a port?So I could listen to know ports whatsoever and be compromised? How would that work? _________________________________________________________________________ Philadelphia Linux Users Group -- http://www.phillylinux.org Announcements - http://lists.netisland.net/mailman/listinfo/plug-announce General Discussion -- http://lists.netisland.net/mailman/listinfo/plug
|
|