Appendix A:
Figure 9-36 Verify Backdoor Access by Performing a Ping
14. Disable all Internet Explorer proxy settings upon your computer
9-28