Jetico will work with bittorrent. I assume that is what you mean by BT. However, the default rule they give you might not be entirely correct....
Although it seems that I have been outvoted on the issue of relying on ISP email scanning, I would like to point out that one can always save any...
It may not be my pet AV, but Bitdefender is on a roll. Right up there with KAV and NOD32.
Outpost users are very fond of the memory management that allows it to show only 2mb of main memory. However, this is not a real measure of what...
Another good reason to run a limited account. Better yet, Linux or a Mac.
If your ISP or mail provider scans mail, there is not much to be gained by doing it again. About 4 years aago my ISP started to scan mail. I...
A hardware firewall will use zero memory and zero cpu. If you have multiple connections open, like with bittorrent downolads, the performance...
There is a lot of strange behavior in internet forums. All forums, not just this one and not just computer security forums. Some of the worst...
The criteria: probably the amount of click through revenue each one produces for that site.
I keep a PIII 450 with 128 MB for software testing. Under W2k KAV exhibits better memory management than Bitdefender by using less active memory...
Actually I don't care about you in particular. Its more about things in general. There are some AV's that run 7 or 8 processes without causing a...
54 processes. Good luck. I wonder what gets done on that machine other than tweaking security applications and getting everything to work together.
The point about logging with a software firewall is well taken. My router does some logging, but it is minimal. I certainly do not believe...
So far as locking down things goes, my approach is to use Firefox with java turned off (unless a site has to have it) and any mail application...
In a word, no. Don't let anyone around here freak you out about outbound protection. It may help in some circumstances, but overall it has a poor...
CHX is definitely da bomb. However, it is conceptually different from most other rule based firewalls. For example, in its out of the box state,...
Why clean a badly infected machine? The best practice is to salvage the data, make sure that is clean, then format and reinstall Windows.
Link?
I believe that some ISP's have come up with ways to identify infected machines, both spam and ddos. They notify the owners and disconnect them if...
It would appear that some classes of malware would not encryot their communications as encryption would render their output useless. Those would...
I think a couple of versions back this would not work. If it works now, it is a nice solution to the problem. It also lets the user customize to...
Uh oh, K fires up Jetico and half of the internet in LA goes down.
Point 1, agree Point 2, agree Point 3, I used to think that w2k was better than xp before SP2 came out. Now I prefer XP. The stability issues...
My ISP (and former ISP) have been scanning mail for over three years. In that time I have not received a single infected email. You must feel...
I wonder what "repeated pop up messages" means. What I hope it means is a reduction in the number of apps that access networking components...
Separate names with a comma.