tag:blogger.com,1999:blog-3223240262697761178.post2977496202339327724..comments2022-11-09T00:36:03.167-08:00Comments on OS-Project-Eva: 3rd Practical PresentationAdán Silvahttp://www.blogger.com/profile/18015310138234167304noreply@blogger.comBlogger1125tag:blogger.com,1999:blog-3223240262697761178.post-11784241504183168562011-11-27T14:01:23.950-08:002011-11-27T14:01:23.950-08:00Hey Max!!
Nice presentation.
Only an idea, you h...Hey Max!!<br /><br />Nice presentation.<br /><br />Only an idea, you have two lists in your firewall implemetation, why not have only one?<br /><br />You can have only the blocked list and maybe all the addresses not included in that list could be trustable.<br /><br />Also, for more flexibility, you can have a file with all the blocked addresses.<br /><br />:)Juan Carlos Espinosa Ceniceroshttps://www.blogger.com/profile/10122977539877115129noreply@blogger.com