G
Guest
Guest
Archived from groups: comp.security.firewalls (More info?)
I gather NAT, SPI, SOCKS and explicit proxy servers are all techniques
of tunneling through a firewall.
I wondered if anyone would care to summarise each in a sentence or two
for the java and computer buyer's glossary.
Think of what the novice most wants to know.
1. which is best for which situation?
2. roughly how do they each differ/work.
see http://mindprod.com/jgloss/firewall.html
and
http://mindprod.com/bgloss/firewall.html
--
Canadian Mind Products, Roedy Green.
Coaching, problem solving, economical contract programming.
See http://mindprod.com/jgloss/jgloss.html for The Java Glossary.
I gather NAT, SPI, SOCKS and explicit proxy servers are all techniques
of tunneling through a firewall.
I wondered if anyone would care to summarise each in a sentence or two
for the java and computer buyer's glossary.
Think of what the novice most wants to know.
1. which is best for which situation?
2. roughly how do they each differ/work.
see http://mindprod.com/jgloss/firewall.html
and
http://mindprod.com/bgloss/firewall.html
--
Canadian Mind Products, Roedy Green.
Coaching, problem solving, economical contract programming.
See http://mindprod.com/jgloss/jgloss.html for The Java Glossary.