From: Frank Willoughby <frankw@in.net>
To: cypherpunks@toad.com
Message Hash: 61e0194dc5b719035d5b003024d12039ef33ec496d20087b8ff66bfff9ea4a73
Message ID: <9607211223.AA29688@su1.in.net>
Reply To: N/A
UTC Datetime: 1996-07-21 15:28:16 UTC
Raw Date: Sun, 21 Jul 1996 23:28:16 +0800
From: Frank Willoughby <frankw@in.net>
Date: Sun, 21 Jul 1996 23:28:16 +0800
To: cypherpunks@toad.com
Subject: Re: Firewall Penetration
Message-ID: <9607211223.AA29688@su1.in.net>
MIME-Version: 1.0
Content-Type: text/plain
At 08:18 PM 7/20/96 -0700, Jerome Tan allegedly wrote:
> Is it possible to penetrate a firewall?
Absolutely. (Having done so a time or two)
FWIW, of @70 firwalls on the market, only @5 are adequate to protect
a company from the hazards of the Internet.
Before anyone asks, Fortified Networks is a vendor-neutral InfoSec
Consulting company and doesn't sell firewalls or other security products.
Best Regards,
Frank
Any sufficiently advanced bug is indistinguishable from a feature.
-- Rich Kulawiec
<standard disclaimer>
The opinions expressed above are of the author and may not
necessarily be representative of Fortified Networks Inc.
Fortified Networks Inc. - Information Security Consulting
http://www.fortified.com Phone: (317) 573-0800 FAX: (317) 573-0817
Home of the Free Internet Firewall Evaluation Checklist
Return to July 1996
Return to “peng-chiew low <pclow@pc.jaring.my>”