Hi there, I release in a kind of "beta test" my new leaktest "Ghost". In fact, my website ( http://firewallleaktester.webhop.net ) had a major update which is waiting your feedback first about "Ghost" leaktest before i put it online. When all will be ok with "Ghost", i will add it to my site in same time of all others update (including new leaktests results). Ghost beta test version available here : http://perso.wanadoo.fr/jugesoftware/Ghost.exe MD5 : D5F8069EEDC4AA75EE0F001D517DE972 I would want your input about it, if you think something need to be improved or explained, as well as of course results you can see with your firewall. How it works ? In a very simple way. First step, It just call directly Internet Explorer, in the same way that the "test 2" from Wallbreaker or Tooleaky does, and which is seen by firewalls i evaluated. Second Step, the "secret" , is that since firewall reacts to events, if you are quicker and can "disapears" you can put them in trouble to locate the source. This is why "Ghost" rerun itself, modifying by the way his PID. Ghost just reach one page, but by doing multiple time this trick, i was able to transmit data through firewalls whereas they were able to block it if done normally. So i would want to know what do you think about it, and if it works on any OS (was tested on win98/Millenium/Win2000/XP) and if you think it's ready to add it to the site and release it officialy (not as beta test version). Thanks you EDIT : to test it, you have to give full access to IE and see what happens.