Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
Derek Atkins wrote: > > If you allow any real-time protocol through your firewall, someone can > tunnel through it. It's a fact of life. If you allow telnet, ssh, > http, even nntp or smtp, it can be used to tunnel another protocol. > If you want to disable tunneling, unplug yourself from the 'net. If > that isn't an option, then you're going to have to use social means to > prevent people from doing it. Or stateful inspection tools. Which is what I was asking about. - Subcription/unsubscription/info requests: send e-mail with "subscribe", "unsubscribe", or "info" on the first line of the message body to discuss-request at blu.org (Subject line is ignored).
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |