Hey, I've been using TPF 6.5 for a while now. I just noticed it appeared to be calling home. This is the first time I ever noticed it. I also now get an error upon starting up my pc, in regards to tiny firewall, that I have to hit 'ok' on. Despite that, it still seems to work fine for what it is supposed to do. It was sending packets to 141.202.248.35. I am curious because recently I went to their website (Tiny software), and got redirected to CA. I knew about CA taking over for a while, but still visited the Tiny site for TPF help. Anyway, any input would be appreciated.
I noticed this, after having restored my system to a few days earlier because my Windows Installer got really messed up. Anyway, before that fact I tried the pcflank leaktest, and my TPF failed that, even though it says TPF and Outpost were ones that succeeded. Just now I failed the leaktest at GRC.com, and didn't even see an entry for leaktest.exe, nothing came up either. So my point being I think TPF may have become messed, for lack of better wording, with the system restore. Does this sound right? As I said in the first post, it still blocks inbound stuff. Kinda disappointing, as I like TPF. I may not be an expert with it, but can manage. So with CA taking over, I may be outta luck. Think I may have to give Outpost a whirl again. TIA.
At TPF forum, there was some thread about TPF calling home. It's a long time, and I could not remember the cause and how to handle it any more. Unfortunately, TPF sites have been shut down by CA. TPF can easily pass all the leaktests if you configure it correctly. With TPF, all the power is in the user's hands instead of the developer's hands. That is the beauty or pain of it depending on how you look at it. Without the help from TPF forum, I personally do not think it is a good time for you to try it. I used Outpost Pro for around one year before I switched to TPF. IMHO, Outpost Pro provides good enough protection.
Thanks for the info. Yeah, I tried findind the old documentation through the wayback machine at archive.org, no luck, as clicking any deeper would just go to the CA page. Maybe I can find it in google's cache. I guess I should have saved it while I had the chance! Anyway, some of TPF stuff is pretty advanced, but if I read what I am doing, I usual get by. I prefer Outpost, but had some issues with it bringing my DSL to a halt, maybe I'll try 4.0. For the moment I'll stick with TPF. Oh, and I blocked whatever TPF was sening to CA with my HOSTS file.
I am not sure if you are talking about the particular API access related leaktest, which you had problem with and was discussed quite some time ago. For that particular one, Tiny can pass it using methods other than executable blocking. I would agree that it is not a good idea to claim TPF can pass all leaktests, as people may not be able to find out the right way to do it and new leaktests are invented all the time.
Im sick of all the grey on Tiny's abilities, so how about this: Anyone who can show detailed instructions on how to get Tiny to pass all leaktests listed at www.firewallleaktester.com gets 50$ US money order from me, I give my word. Either way, this will do good
Post #1 has some leaktest info for Tiny and a few others. https://www.wilderssecurity.com/showthread.php?t=112187 It's not even the latest release of Tiny.
cprtech's link already tells a lot. Not me. My consulting fee in reality would be more than $100 per hour without actually doing anything. As a TPF customer, I do not really care if other people like TPF or not as far as it works for my money. As a member of WSF, I just try to contribute and help others as objectively as I can.
If it were a couple of years ago, it would be great to write such a detailed instruction even for free. At this time, it is just not worthwhile IMHO. People are moving to Vista and 64bit OS (Vista or Linux) in the coming years. TPF is just going to vanish soon. Actually, it would be interesting to find out how effective other HIPS software would be on Vista too.
I can assure you that Tiny, correctly configured, will pass all the leaktests on Firewall Leak Tester. I have thrown every leaktest at it I can find, and they all fail. Configuring Tiny can be a pain in the arse, and like all HIPS there is a balance between locking your system down, and maintaining usability. Some logic, and thinking about your rule-sets, and what you are trying to achieve helps. User knowledge of the OS is a must, and Tiny's help files were always spare. Quite why CA shut down Tiny's user support forum is beyond me: rather mean-spirited. Without the forums Tiny is doomed to fizzle away, guess this is what CA wants. I'm sticking with Tiny for now; I have no intention to move to Vista, with its DRM. I've tested quite a few HIPS and firewalls, and keep reverting back to my trusty Tiny. It is a great product.
I agree, i used tiny back in the days and it always worked well for me. I haven't used it in a while however. I also agree that i do not plan to be using vista anytime soon. If its anything like what i've read i may not use it ever.
Than I wish you a great Linux time because at some point WinXP wil be no longer supported of course...
Yeah thats true, but hopefully its not for a few years yet. I guess i'll cross that bridge when i come to it.
XP Home will be supported until December 31, 2008. XP Pro will be supported beyond 2011. See article. http://arstechnica.com/news.ars/post/20060112-5970.html