Re: outbound filtering
- From: William <starrwarz@g_~-clothes-~_m~more_clothes~ail.com>
- Date: Wed, 27 Dec 2006 17:25:40 GMT
On 12/27/2006 2:49 AM, something possessed Sebastian Gottschalk to write:
William wrote:People asking for advise often don't know exactly what's out there to fulfill their needs, otherwise they'd get that and not ask for advise.
What problem? He didn't give an abstract or concrete problem, the OP just asked for some advise,
No, he didn't ask for advise. He brabbled arbitrary nonsense, giving a good
indication that he doesn't know what he wants or what he's talking about?
Nonetheless, it IS a hardware firewall, and since you felt inclined to mention that it wasn't, someone needed to provide correct information before whoever reads this thread becomes as confused about firewalls and Internet Security in general as you.- NAT routers aren't firewall or security devices.Depends on the router, but most NAT routers act as hardware firewalls, blocking unsolicited inbound connections.
Well, just by coincidence (since NAT works that way). However, this is not
reliable and easily circumvented. Thus, it doesn't provide security.
Maybe Packet Sniffing, or Monitoring not just when a connection is made, but when an application changes (Kerio Personal Firewall provides this PROTECTION, if a process is changed, the user is alerted to it).
- Monitoring connections doesn't require extensive packet filters withWell, that will tell you where your remote endpoint connections are and what programs are making the connection, but not much more than that.
state machines, but just standard operating system tools requesting such
information directly from the OS.
What else do you want?
On that note, these are snapshots, not real-time displays of connection activity.
Wrong again. There are numerous implementation that provide a complete
cover over time.
No, I'm recommending hi not listen to you and install either TCPMon or if he wants something more secure to monitor outbound connections Kerio Personal Firewall. I've never had it destablise my PC, and it's much more secure than running without (but hey, at least he's got a hardware FIREWALL (router).For a real time display of remote connections I'd recommend Kerio Personal Firewall,
So, you're recommending that he should make his computer intentionally
vulnerable and unstable? That's really not nice.
I try to get 8 hours of sleep every day, but in most circumstances it DOES work.
- Outbound filtering doesn't work.It doesn't?
Welcome to reality. You've been sleeping for... how long?
They're related, just like a burglar alarm is related to security, a firewall is an essential asset to Internet Security (though it shouldn't be the only measure)
Never did, never will, beside the wishesWell, granted it's not perfect, but neither are AVs.
because it would be nice if it actually worked.
Oh, you finally understand the difference between protection and intrusion
The only way this user's system would become more vulnerable is if he were to take your advise. While FWs aren't perfect, they are essential to any Internet security implementation. Of course, no one is saying that that should be the only user's course of action. I'm sure the OP has already takes some other necessary steps toward securing his/her PC long before posting here (i.e. using a NAT router, implementing at least one AV product (but only one real-time scanner), and practicing safe-hex practices regarding web-site and attackments.
They may be allowed to be circumnavigated, but in the world with Windows and Gates nothing is perfect.
That's a lame excuse for not defending against running the malware in first
place. Which is a serious security concept that provides protection. And
doesn't make the system more vulnerable.
Um...This link doesn't work the way you're intending it to. For one, it DOESN'T access prefs.js. I thought that maybe it was because of a wordwrap, so I created a simple test.html file with <head><title>test</title></head><body>your broken link thingie</body>. I think what you were intended to demonstrate is that some processes may try to make changes to other program's user-prefs (AFAIK, Kerio protects against this, but I haven't had the opportunity to test this out. I do know that when one process tries to access another (which is interprocess communication, not what you were trying to demonstrate just now), that Kerio does protect against that by alerting the user and asking if he/she wants to allow or deny. Also, if I were to click this link in in Firefox, Kerio would alert that Firefox was trying to access the trusted zone (unless a rule is already set up), in which case, knowing that Internet Browsers should communicate with the Internet, and what business does it have accessing any files on your computer, than I'd simply block it).
And the reason isElaborate on this please. Are you referring to rootkits, bad modules hooking into legit processes, or just processes communicating with eachother via localhost port communications.
inter-process communication, some feature that you wouldn't like to miss
for /r %i in (prefs.js) do echo
No, it won't, because it didn't work.
And the next time you start up Firefox, it will phone home on behalf of the
Now, would you finally get a clue that you don'tWell, will you get a clue that that was never the argument. The argument was that you were being a mere child attacking others at any sign of ignorance, rather then trying to assist others, in order to boost your inflated undeveloped ego. Now that you had to try to defend your position, the usenet community that hasn't killfiled you yet can now see that you haven't a clue what you're talking about. Hopefully, this will pursuade you to lurk for a little bit and listen to the real experts, rather than spout garbage that may be harmful to the end-user should they listen to your rantings. In Summary: NAT Router=Hardware Firewall. Firewall=good (It depends on the FW, but I recommend Kerio, in addition to NAT Router). No Firewall=Bad.
even need direct IPC at all to remote control other applications?