How secure is Jetico?

Discussion in 'other firewalls' started by James Mayo, May 9, 2006.

Thread Status:
Not open for further replies.
  1. James Mayo

    James Mayo Registered Member

    Joined:
    May 9, 2006
    Posts:
    3
    I just installed Jetico due to the best leaktest results posted here:
    http://www.firewallleaktester.com/

    The only problem is that I am not sure how to configure it so that I get the same level of protection.

    For example I trained it to ignore windows explorer, otherwise it is almost not useable. Now the only problem with that is if an unwelcome process creates a new instance of explorer to send data, I won't be alerted, or am I missing something?

    So how can I minimize the popups without reducing the security, or is it a trade off between popups and security? o_O
     
  2. khazars

    khazars Registered Member

    Joined:
    Jun 8, 2005
    Posts:
    124
    Location:
    Glasgow, Scotland
  3. James Mayo

    James Mayo Registered Member

    Joined:
    May 9, 2006
    Posts:
    3
    hey khazars!

    I saw that post and was reading through it as a sort of tutorial and getting the hang of setting up the rules. The only problem is once I create a rule for an application, doesn't it compromise the security of the firewall?

    What I mean is that if I create a rule in the application trusted zone for internet explorer, allowing it access for me to browse, then if my pc is infected with a trojan or adware they could create an instance of internet explorer and send data through the firewall and the rules would permit it to do so.

    Perhaps it would be good to have an option to ask for confirmation every time a new instance of the application is started. Hmmm but then a tojan could try and take control of the authorised intance of internet explorer, unless something like process guard could be used to alert you of such activity.

    So for me I don't mind authorising a new instance of internet explorer manually, but I can't stand having to authorise every little piece of internet traffic to and from internet explorer which leads to hundreds of manual confirmations just to check my hotmail account.

    So can I set up Jetco to ask for each application intance to be authorised and then protect each application instance with process guard?
     
  4. Stem

    Stem Firewall Expert

    Joined:
    Oct 5, 2005
    Posts:
    4,948
    Location:
    UK
    It is not good practice to place applications within the trusted zone....but even with this...the application is hashed (checksumed), if there is a change to the application that is allowed access then Jetico will inform you via its "attack module" If another application attempts to start your app (parent-child) Jetico will also alert you to this.

    Edit,
    see attached pic for application attack protection covered within Jetico.
     

    Attached Files:

    Last edited: May 9, 2006
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.