> By using the antivirus software in HTTP proxy mode.
I am not very sure of this particular filtering model; could you please
briefly enumerate the chain of boxes the traffic should traverse to get
monitorized with this schema?
Thank you in advance,
-- V�ctor (CIC - UPO.es)Received on Sun Feb 09 2003 - 05:00:52 MST
This archive was generated by hypermail pre-2.1.9 : Tue Dec 09 2003 - 17:13:17 MST