On Sat, 16 Jul 2011, Ljubomir Ljubojevic wrote: *snip* > I wrote about "physical presence *outside* of your network", like if you > are on a large WISP that uses bridged network (bad design) and your > Wireless client is bridged, and you have single NIC firewall in place, > entire WISP's network will be able to sniff your traffic and hack into > unprotected workstations/desktops. And there are those scenarios, much > more then you can think. Which is why one poster mentioned that you need to be familiar with IPtables and Networking before trying to make your machine(s) network(s) secure? I read some time ago something about tunneling different protocols through firewalls? which sounded quite scary. Keith ----------------------------------------------------------------- Websites: http://www.karsites.net http://www.php-debuggers.net http://www.raised-from-the-dead.org.uk All email addresses are challenge-response protected with TMDA [http://tmda.net] -----------------------------------------------------------------