CHAPTER
Protocol Tunneling |
4 |
INFORMATION IN THIS CHAPTER
• How Protocol Tunneling Works
• Dangers of Protocol Tunneling
• Defending against Protocol Tunneling
• The Future of Protocol Tunneling
You’re at work and bored as usual. You decide to take some time off from monitoring network security alerts to download some music. You hop on the Internet, download a peer-to-peer (P2P) file-sharing program, and install it on your company laptop. Nice. Now you’re ready to download.
Your first few searches don’t seem to work, and soon you’ve figured out why. At the bottom of the window is a little icon that indicates that the file-sharing program has detected a firewall. You are being blocked by your company’s Internet policies. The software needs ...
Get Seven Deadliest Network Attacks now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.