[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
mailtunnel
- To: debate@fitug.de
- Subject: mailtunnel
- From: Ulf Möller <ulf@fitug.de>
- Date: Sun, 12 Mar 2000 13:16:46 +0100
- Comment: This message comes from the debate mailing list.
- Mail-Followup-To: debate@fitug.de
- Sender: owner-debate@fitug.de
H-E-L-P-I-A-M-B-E-I-N-G-H-E-L-D-A-G-A-I-N-S-T-M-Y-W-I-L-L
B-E-H-I-N-D-A-S-O-D-D-I-N-G-C-O-R-P-O-R-A-T-E-F-I-R-E-W-A-L-L.
For those whose workside Net access is pinned underneath several
protocol layers of firewall, proxy servers, filtering
software and a large fierce dog owned by your bastard IT
department, comes MAILTUNNEL, one of the more desperate
protocol hacks you'll ever be tempted to use. In layman's terms,
it's the equivalent to pricking out messages in blood
with a broken thumbnail onto paper made from your own scalp
sheddings, then throwing them between the bars of your
Turkish prison in the hope that someone may find them sixty
years on. More technically, it tunnels a two-way TCP/IP
connection through, may Postel forgive us all, an exchange
of e-mails. You may find it useful, if only as an indicator
that it really is time you changed jobs. Or rose up against
your sysadmin.
http://detached.net/mailtunnel/desc.html
- those fifty-line company legal disclaimers .sigs? *steganography*!
(K) 2000 Special Projects.
Copying is fine, but include URL: http://www.ntk.net/