Re: Is Firewall essential in this case?

Sebastian Gottschalk wrote:
Dickie Peters wrote:

Like everyone else, I want to prevent any hackers from attacking my
machine. I want to block those attacks,

There is no need to block anything that should trivially fail anyway.

but at the same time I would
like to prevent anything that should not be on my computer, such as
malware, from sending out my personal information or whatever.

This doesn't work, no matter how much you want it.

The real solution is to simply not run any malware in first place. This is
what you should focus on.

Being on disability, I cannot afford a lot of expensive software. With
that, can someone offer me the basics of what I should have installed
to offer me as much protection, both incoming and outgoing, as

Stop thinking in terms of installing more software would help.

Competent usage helps. Secure configuration helps. Using non-vulnerable
software helps. No software could replace that.


It seems to me that you have some strong opinions on the subject of computer security. But perhaps you should think about how you word your opinions before you send them off.

The idea of groups such as this is to /discuss/ computer security and to provide /assistance/ to people who ask for it. You are simply trying to prove to everyone that you are better because you know about it, and everyone else deserves nothing more that to be looked down upon.

The concept of providing assistance, especially to people who wish to learn, is to provide constructive criticism, not to say "I know how it works, so do it my way or else you may as well not do it at all." I can see that you do indeed know about computer security, and you can provide a wealth of information, as well as to identify potential threats; but that does not mean that someone who offers a suggestion that does not cover that threat is incompetent and deserves only your contempt.

Instead of saying "No, your wrong because of this. Do it my way - /it/ works", perhaps something more along the lines of "Yes, that will cover those threats, but will still leave open this vulnerability. This should cover it as well", and be open to further suggestions that are perhaps easier to manage/implement, instead of saying "my way works, so use it".

Different solutions are suitable for different people. Your way might work, but others can as well, and may sit better with the people who use it.

Knowledge /is/ power.
Wisdom is knowing how to use it.


Relevant Pages

  • Re: [Full-disclosure] windows future
    ... its quite possible that all these bits of malware ... approximate date when number of NEW threats reached 1 Million: ... the insecurity of Windows creates a public space, of sorts, an area ... to prolong the life of the platform, ...
  • OT Osama bin Laden Scams
    ... Computer security experts warned today that online scammers may seek ... to exploit the death of Al-Qaeda leader Osama bin Laden to spread ... to malware infected Web pages." ... "Links are already beginning to spread across Facebook, ...
  • Re: Experts: Malicious program targets Macs
    ... I won't enter into debate with someone who shades citations to suit his own argument, and I repeat, there is nothing out there now threatening the Mac OS, and there hasn't been since the inception of OS X. ... The only threats up to date are inside threats to the gullible user. ... I was making a distinction between demonstration of a vulnerability and malware that can exploit it by installing itself in the Mac OS on its own, without the gullibility of the user. ... Do you believe that the OP is right, that malware attacks are coming, and that a wise Mac user should now install preventive software? ...
  • Re: Security
    ... Erunt (use before installing anything) ... What if I wanted to allow malware to wreak havoc on my computer since ... PS There is more to this than just getting the kit - you must know how ... while it does add some incremental protection against inbound threats is ...
  • Re: Malware Triangle
    ... Maybe your geometry is off and a triangle is not a good model. ... Maybe a "Quad Threat Matrix" where email (spam and phishing) are another angle of the ... | I agree on the malware definition - but once I had the triangle setup, ... | was hard to separate it from the rest of the threats. ...