Figure 9-36, Verify backdoor access by performing a ping -28 – Motorola 2.1 User Manual

Page 129

Advertising
background image

Appendix A:

Figure 9-36

Verify Backdoor Access by Performing a Ping

14. Disable all Internet Explorer proxy settings upon your computer

9-28

Advertising