
Internet. Once this was accomplished, anyone going to your Web site would be redi-
rected to the other. BO2K also allows plug-ins, developed by third parties, to be
used on the server side, client side, or both. Many third parties have taken up the call
and developed some ingenious, albeit lethal, plug-ins.The plug-in modules allow for
even greater functionality from the server or client.These include:
■
See the user’s desktop live through a small video stream.
■
When the user logs on, it sends e-mail with the user’s IP address to a
selected e-mail address.
■
Encrypt all network traffic from BO2K, so administrators can’t detect it on
their network.
■
Piggyback ...