The probability of the risk and/or the consequences of this action occuring may be more than acceptable. In which case there's no good reason to...
LnS uses a separate Application sandbox-like module to do this.
No, this is completely wrong. Worms need a) inbound access to infect machines and b) outbound access to infect others. Leaktests test outbound...
I find posts like these mildly amusing to say the least. I'd really like to know how to perform these mysterious 'voodoo' acts, voodoo because...
I was going to respond to many of the points in Paranoid2000's latest post, but it seems that we both are trying argue different points from...
The vast majority I have seen do not do the latter. That is to say, they do not access network resources in a way not monitored by the firewall....
Come on now, did you actually read the links provided? substitution: The author of this page doesn't know what the word 'substitution'...
Here's my interpretation: When you see the phrase IDS (by itself) it used to mean basically a network traffic only completely passive signature...
If I'm not mistaken, all this hardcoded code does is look for characteristic Window string names (MozillaWindowClass or IEFrame) in an already...
You ask a great question. The short answer is that no-one knows what your device will do. Perhaps a longer answer is in the following threads:...
Is it my imagination or did I already suggest you read Paranoid2000's definition here:...
Three things are likely to be the main contributors (some dependent on each other): 1. Commonality of the traffic and/or rate of new...
No, you cannot make direct conclusions from this. No. If we're talking about time in seconds, than the importance of this is overstated....
In stated order: TrojanDemo seems to be overstating what is possible - more information is needed on how this operates. Hence, I would have...
Ah, but that's a choice you have made. If you have created this rule for Automatic Updates, then it is possible to restrict it to Microsoft's...
It sounds like you're after a firewall which also does checksums on components used by the executable/dlls. But firstly, three things need to...
I tried this when I began searching for open-source firewalls. When I shutdown the software, it continued to block traffic and could only be fixed...
Perhaps a summary: http://www.dslreports.com/forum/remark,13307179
My limited testing has reached the following conclusions: - Kill #7 (sending Close messages (called WM_CLOSE) to all windows in the target...
Interesting. So which of these is stopped by an Kerio 2x admin password? http://www.diamondcs.com.au/index.php?page=process-termination-methods...
Yes, I have to agree with donutbandit on this. Kerio 4x is a complete nightmare. Their quality assurance processes leave a lot to be desired.
BlackICE does not have a "firewall" in the traditional sense. Its main protection mechanism is an application component 'sandbox' (nothing to do...
BlackICE is an (semi-active) IDS not a firewall.
This is directly related to 4x not 2x (2x can't stop applications from running). Otherwise, the ones on that website mostly rely on Remote...
This is completely false. Leaktests in 99% of cases depend on your ruleset. Most leaktests are also testing application sandboxing ability, which...
Separate names with a comma.