Quote:
Originally Posted by ocena
How? Does a simple program can do that?
By finding the loop holes in the firewall applications.