The first step to doing that would be to determine what kind of firewall it is, and then seeing if there are any known hacks for it. If done properly, firewalls like this are usually fairly bullet-proof (as far as preventing unauthorized Internet access),

and hacking is made more difficult by the fact that very few firewalls are the same, and there is no way of knowing if or what hacking will effect the firewall.

Are you replying to another post somewhere?

Be a part of the DaniWeb community

We're a friendly, industry-focused community of developers, IT pros, digital marketers, and technology enthusiasts meeting, networking, learning, and sharing knowledge.