Hope this is not OT, but re the references to MS Office in your "dedoimedo" article, I hated why Office 2007 had to abandon the look, shape and...
Interesting thread.. No, I do not "desire" security - following Rmus's analogy, I prefer myself to use my camera (rather than to look at new...
Just a thought.. If other people have allowed their e-mail directories to be scanned, Facebook may simply have collected your e-mail address...
Hi Paranoid, Surely we are only talking about a table with say the last 60 seconds of "UDP out" requests being maintained at any point in time,...
Manny, that's a really useful thread on the OP forum. I have recently been going through a similar process with the component stuff - turning...
Manny, The spoofed packet from the third PC is from 88.10.25.100 not .101, ie same address as the second PC.. [Edit - Ignore this line, my...
Sure, understood..
Stem, That's a great demo, and suggests that there is not a lot of difference between SPI on or off. SPI off at least checks the external...
I agree, I have gained lots from this.. There is a current thread that partially looks at SPI here:...
That's great - and many thanks... ..and that was me just thinking that your patience was beginning to wear thin.. LOL...
Stem, I'm being slow again (!) - is that test above as follows: With SPI enabled on PC1: 1) PC1 > PC2 : PC1 sends packet / establishes...
The few reports that you do see tend to be focused more towards the larger commercial products rather than for personal software firewalls.. Looks...
Stem, That's really clear, especially the re-iteration between static and dynamic, thanks - some googling I was doing makes more sense......
@HKEY 1952.. Is SPI as described in the post by Paranoid, or as recommended to be applied, different (and possibly additional) to that...
Thinking of the thread above, I guess one needs to be clear as to what extent some issues might be the equivalent of dodgy brakes (or worse),...
No misunderstanding.. yes, it used to result in temporary internet loss. Thanks to your input here, I have now tried relaxing the intruder block...
@ Escalader I understand..:) I know this is slightly OT, but actually, despite having to go through this process to quieten it down, I...
Stem / Manny, Just a quick follow up from earlier, I tried putting the logging into Level 2 debug mode, which clarified a few things for me....
Manny, Correct, in this case it wasn't a DNS server block because at that time I must have had it set for more than "4 blocks for a timeout" -...
Stem, I am not sure I follow your process.. Are you saying that raw unsolicited UDP packets sent to a client machine (with Outpost) get...
Manny, I am presuming that there must be some alternative form of state working here (other than simply SPI as you mention above), otherwise...
Manny, Hope this helps.. Columns should be self evident - in the firewall log, the address / port is external, following by bytes out / in. In...
Manny, Just for info, I have now tried using SPI for the SVCHOST DNS rule but it does not work.. It doesn't cause problems at all, but Attack...
I think I may be getting my head around this separation of the Attack Plugin.. If I exclude the DNS servers in Attack Detection (ie trust the...
This may be a bit detailed (and not detailed enough to be actually useful), but I did a quick exercise looking at my Firewall log and Packet log,...
Separate names with a comma.