Completely insecure: See: http://www.dslreports.com/forum/remark,12728187~mode=flat http://www.security-forums.com/forum/viewtopic.php?t=26785
According to RFC TCP will be used for transfers over 512 bytes. It probably occurs rarer than a blue moon. I do not believe this behaviour...
How is this relevant? What methods does the Jetico Firewall take to ensure that the engine does not slow down with increasing number of rules?...
Don't worry I hear you.
Ok now we're getting somewhere (I think) Alright which of the scans in the nmap man page are you referring to? (...
Unlikely found in any software firewalls. Most likely in the latest and greatest hardware firewalls.
Ok so you're talking about scans, types of port scans I guess. You do realise that you cannot stop people scanning your machine? I would also like...
If you say so. Emphasis mine: Point A: First of all SPI is almost irrelevant in regard to trojan detection or execution permissions....
Frankly I think Phantom is confusing SPI with DPI. If he/she was talking about relying on DPI rather than rules-based firewalls with software...
Separate names with a comma.