Re: Firewalls and Anti-Virus Installation After Your Windows PC Is On The Internet
Date: 22 Aug 2003 13:30:53 -0700
tracker <"snailmail(remove)222000"@yahoo.com> wrote in message news:<3F43CDD9.email@example.com>...
> Tracker has decided to make this post for my amusement and to actually
> see how much security really means to the people of this world.
And when will you be climbing the twin peaks of Mount Killamanjaro?
> Carefully consider your responses to this post, because you may be
> eating your words. Others have asked me to back up my information which
> has been posted on Usenet and I'm willing to make the time to prove my
Thank you. When might you make the time?
> Here is my question to all:
> Your Windows system is connected to the Internet including some
> anti-virus application, but no firewall.
The system is vulnerable. Install a firewall before proceding.
> Most people forget to disable
> the services Windows enables by default, like print and file sharing.
Sorry, but in every computer I've had since Windows 95, file and print
sharing have been disabled by default.
> A user comes along
Just any old user? Should this user be related to you?
> and installs an anti-virus application, how is this
> application going to close the "Open Ports" in Windows?
It won't; AV software doesn't deal with open ports, and it was already
in the computer. What it was lacking was a firewall, ya silly goose!
> By now, the
> malicious hacker has installed their Trojan Horses, Backdoors and
> Virtual Private Network(s) on your computer, allowing them easy access.
> You come along and install say one firewall, hardware or software, how
> do think this is going to protect your computer and be "damn" specific?
If you want specifics, you'll have to buy my book. If you want
generalities, here goes:
1) Scan computer for viruses, trojans, backdoors, unauthorized VPN
and AOL connections, incorrect daylight savings time, seat back and
tray table settings, ferret feces, etc. Repair, clean, and disinfect
2) Firewall set to block all ports and log attempts. User reviews
log and traces activity to applications. Suspect apps are removed.
Repeat step 2 until no network traffic remains.
3) Firewall is set according to the user's preferences.
> When all is said and done, Tracker will have faced the world and shown
> you the "Secrets of The Hacker Underground". Take this post as a post
> which will be so serious you will be Thanking me.
Thank you. But all seems to be said and done, and tracker have not
faced the world and shown us any secrets. When will you grace us with