Since a president and chief executive of CheckPoint Software
Technologies Inc. was quoted, does that mean Los Alamos's
firewall was a FW-1 ???
> Among other things, the hackers' robot exploited a known
> security hole in a Unix e-mail program. Most people program
> their firewalls to accept e-mail from the outside, which would
> allow such an attack. One way to prevent that is to set up
> another firewall that screens mail sent from the server
> computer to individuals' desktops, said Deborah Triant,
> president and chief executive of CheckPoint Software
> Technologies Inc., Redwood City, Calif.
/ Katarina Harcus