I was looking for unusual techniques. I initially referenced the usual techniques, like iptables, and was searching for other methods. It would be helpful to me if you would address the initial context that I presented. If you think there are risks involved in using an uncommon practice, that would be information I would find useful. I would find any thoughts you have explicitly addressing the entire context of my post useful.
[Message sent by forum member 'chriskhan']
http://forums.java.net/jive/thread.jspa?messageID=393209