Yes - but ICSA-certified products automatically meet these criteria, by definition ;D AFAIK none of the Linksys or D-Link products are...
When choosing a router with firewall, make sure its firewall part is ICSA-certified (ie. a real firewall) ;) You get such routers for less than...
Hey gk ; Actually, I preferred your previous site ;D Don't want 2 spoil your day - just a matter of personal taste, that's all; IMVHO, I...
Yes, knowing you I readily believe you when U say that ;D Keep us informed of the results!! ps. when is your 'leaktest site' due 4 its...
Now now! ;D I am not a self-proclaimed fw guru (I wish I had their knowledge though) but only a very, very demanding USER, and my comments are...
I think not ;D Why should he bother? Just google the words 'bitguard', 'firewall' and 'leaktest' : you will find that this firewall has...
Whoops! Sorry, I hadn't noticed your sig - U already have the full version :-[ A pity - if U had a demo only, U could have asked for a free...
Hey gk, so much advertising for DCS should not go unrewarded! U ought to claim a FREE REGISTERED LICENSE!! ;D ;D
One more thing: ZA is a good firewall, BUT I've had word that it was absorbed by another company, can't recall the name - anyhow, it is no longer...
Actually, I use ZA myself more often than other firewalls; The main drawback is the fact that it wallops a huge amount of resources, especially...
Yep - IF the user knows which processes/services need clearance. Not all users can be expected to know that (ie Granny using Windows hehe :D )
Wayne> Hey man, no offense but if I recall correctly (page 1), YOU brought up the subject about leaktests. And moreover, this is the...
Hey gk It's Morgoth, not Morgott bah, never mind ;D I'm a Tolkien fan, that's all Precisely! That's my point: PG may be somewhat more...
hehe - so ? We're talking about process protection here - Process Guard just detects copycat trying to access another app, not trying to access...
sir-carew & bigc> U are BOTH wrong! ;D these AVs' monitors may scan the memory, but ONLY upon startup (like the on-demand scanners), not...
Yeah - I guess that's the way it's done...in MOST cases
No, no, I am paying attention to the rest, but the topic I started WAS about "invisibility" in the first place! I mean, isn't it obvious that IF...
Phantom> Maybe, but I guess private users stuck with a STATIC IP don't have much choice if they don't want to be sitting ducks, all the more...
Well you never know, actually - it's a crazy world these days, U know ;D Of cos' ! By definition, (true) stealth is supposed to render a PC...
Blitz> OK danke schön for the details ;) . But when U say: U mean if there is NO machine (therefore no OS) on the receiving end, then...
WHAT THE PROBLEM IS? Isn't it obvious? I thought that the sole purpose of stealthing is to make hackers think that there is NO system behind an...
OK comrades, just read a most disburbing piece of info on the www: it concerns so-called firewall "stealth". Sorry if it's a newb question,...
Hmm ... getting a tad too technical here.. but thanks for the answer, Master! ;D
3 questions I have for any Networking Jedi out there ;D: - For a firewall to be able to block ANY incoming protocol, even non-IP packets, at...
Hi Peaches Just a silly question, but haven't U tried checking out the whereabouts of the 'VSINIT.dll' file, as the error msg states that...
Separate names with a comma.