Final presentation
... The two routed is more difficult to intruders to attack, because he
should subvert both of routers to access system.
Only application gateway, E-mail server, and information server
would be known as system by Internet, no other system name
would be known in DNS database, which would be accessible to ...