On 12/17/05, Callum Lerwick <seg@xxxxxxxxxx> wrote: > They deliberately decide to poke holes in their firewall by running a > UPNP enabled application. And when the user doesn't know its upnp enabled application? Or when the application is malicious and misrepresents what its suppose to be doing and does upnp operations withuot clear consent from the user? -jef -- fedora-devel-list mailing list fedora-devel-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/fedora-devel-list