1996-07-21 - Re: Firewall Penetration

Header Data

From: Frank Willoughby <frankw@in.net>
To: cypherpunks@toad.com
Message Hash: 61e0194dc5b719035d5b003024d12039ef33ec496d20087b8ff66bfff9ea4a73
Message ID: <9607211223.AA29688@su1.in.net>
Reply To: N/A
UTC Datetime: 1996-07-21 15:28:16 UTC
Raw Date: Sun, 21 Jul 1996 23:28:16 +0800

Raw message

From: Frank Willoughby <frankw@in.net>
Date: Sun, 21 Jul 1996 23:28:16 +0800
To: cypherpunks@toad.com
Subject: Re: Firewall Penetration
Message-ID: <9607211223.AA29688@su1.in.net>
MIME-Version: 1.0
Content-Type: text/plain


At 08:18 PM 7/20/96 -0700, Jerome Tan allegedly wrote:

> Is it possible to penetrate a firewall?

Absolutely.  (Having done so a time or two)

FWIW, of @70 firwalls on the market, only @5 are adequate to protect 
a company from the hazards of the Internet.

Before anyone asks, Fortified Networks is a vendor-neutral InfoSec 
Consulting company and doesn't sell firewalls or other security products.

Best Regards,


Frank
Any sufficiently advanced bug is indistinguishable from a feature.
	-- Rich Kulawiec

<standard disclaimer>
The opinions expressed above are of the author and may not 
necessarily be representative of Fortified Networks Inc.

Fortified Networks Inc. - Information Security Consulting 
http://www.fortified.com     Phone: (317) 573-0800     FAX: (317) 573-0817     
Home of the Free Internet Firewall Evaluation Checklist








Thread