Firewall Software Recommendations?

Discussion in 'Virus Information' started by W. Watson, Feb 11, 2008.

  1. W. Watson

    louise Guest

    I used to use Sygate, had all kinds of conflicts with Comodo
    in addition to its endless nagging.

    I'm now using Online Armor free in addition to an NAT
    Router. I like Online Armor very much and find it's "nags"
    are clear and informative.

    Louise
     
    louise, Feb 14, 2008
    #21
    1. Advertisements

  2. What about the nags you don't get?
     
    Straight Talk, Feb 14, 2008
    #22
    1. Advertisements

  3. And NIC's that offload the processing from the CPU. Intel e1000-based
    cards do that, among many others, no doubt.

    Cheers,
    Gary B-)
     
    Gary R. Schmidt, Feb 14, 2008
    #23
  4. W. Watson

    Sebastian G. Guest

    louise wrote:


    I find it nags an obvious attack point for a shatter attack.
     
    Sebastian G., Feb 14, 2008
    #24
  5. From: "Gary R. Schmidt" <>


    | And NIC's that offload the processing from the CPU. Intel e1000-based
    | cards do that, among many others, no doubt.
    |
    | Cheers,
    | Gary B-)
    |

    Yesw. I had an Intel NIC that had a RISC i960 CPU that clock doubled the PCI 33MHz bus
    speed to 66MHz and I used in on a Symantec Ghost server. This server NIC gave me great
    performance when distributing Ghost images.
     
    David H. Lipman, Feb 14, 2008
    #25
  6. W. Watson

    louise Guest

    What does that mean? What is a shatter attack?

    Louise
     
    louise, Feb 15, 2008
    #26
  7. W. Watson

    Sebastian G. Guest


    Google and Wikipedia exist...

    (Oh, and in fact, if you never bothered to check your security software for
    the most obvious security vulnerabilities, then you never had any security.)
     
    Sebastian G., Feb 15, 2008
    #27
  8. http://www.justfuckinggoogleit.com/

    F'up2csf to put an end to this braindead crossposting over five groups.

    cu
    59cobalt
     
    Ansgar -59cobalt- Wiechers, Feb 15, 2008
    #28
  9. From: "Sebastian G." <>

    |
    |
    | Google and Wikipedia exist...
    |
    | (Oh, and in fact, if you never bothered to check your security software for
    | the most obvious security vulnerabilities, then you never had any security.)

    One can check software that has vulnerabilities and if those applications have updates
    through the Secunia Software Inspector. It will identify installed applications that should
    be updated that have not been updated and leave you "at risk".

    http://secunia.com/software_inspector
     
    David H. Lipman, Feb 15, 2008
    #29
  10. What the hell kind of arrogant answer was that?
     
    Richard Steinfeld, Feb 16, 2008
    #30
  11. W. Watson

    louise Guest

    I do check my software with secunia on a regular basis.

    And I don't understand what is meant by checking your
    security software - I do a shields up check on a regular
    basis, run Nod32 and SuperAntiSpyware along with Spybot on a
    periodic basis.

    I seem to have gotten attacked because I asked a question -
    and the attack assumes I don't take responsibility for my
    own security - there is no basis that I know of for this
    assumption.

    Louise
     
    louise, Feb 16, 2008
    #31
  12. TruthWare
     
    Krazee Brenda, Feb 16, 2008
    #32
  13. W. Watson

    Gerald Vogt Guest

    Then why do you install all this strange security software? It does
    not take responsibility for your own security.

    Gerald
     
    Gerald Vogt, Feb 16, 2008
    #33
  14. Most users don't - which is why security software vendors can get away
    with pushing out highly questionable products of bad quality all the
    time.
    Many do. But regarding ShieldsUp - except for the limited ability to
    quickly check if a packet filter of some kind is in place either on
    your own machine or somewhere upstream, it's a useless, hyped up
    promotion tool.
    Due to the nature of modern malware, scanning is unreliable. What do
    you do to actually prevent bad stuff from getting in in the first
    place?
    I don't think anyone questioned whether you take responsibility for
    your own security. Some might have indicated though, that the
    countermeasures you seem to have taken somehow shows that you may lack
    the knowledge to do so properly.
     
    Straight Talk, Feb 16, 2008
    #34
  15. W. Watson

    Bear Bottoms Guest

    I wouldn't know if she does or not. It doesn't really matter as she is
    demonstrating willingness to communicate. I do see you lack communication
    skills, which loses knowledge.
     
    Bear Bottoms, Feb 16, 2008
    #35
  16. W. Watson

    Sebastian G. Guest


    Well, if we started to explain shatter attacks whenever someone asks...

    Oh, and the fact that his "security" software is full of obvious security
    vulnerabilities is just amusing.
     
    Sebastian G., Feb 16, 2008
    #36
  17. W. Watson

    Sebastian G. Guest


    Why? Except for comedian entertainment...

    Ouch!
     
    Sebastian G., Feb 16, 2008
    #37
  18. W. Watson

    Bear Bottoms Guest

    It is as easy as: Wikipedia:In computing, a shatter attack is a
    programming technique employed by hackers on Microsoft Windows operating
    systems that can be used to bypass security restrictions between processes
    in a session. A shatter attack takes advantage of a design flaw in
    Windows's message-passing system whereby arbitrary code could be injected
    into any other running application or service in the same session, that
    makes use of a message loop. This could result in a privilege escalation
    exploit.
     
    Bear Bottoms, Feb 16, 2008
    #38
  19. W. Watson

    Gerald Vogt Guest

    If you stood in a library and someone came to you (assuming you are
    not a librarian) and asked you for the name of the capital of
    Timbuktu, you would run and go and pick the next encyclopedia, look it
    up, copy it, and give it to the person in question? You would not just
    wonder whether that person was a little bit crazy or wonder whether
    that person thought you were a librarian and paid for that job? You
    would not tell that person that it should check a encyclopedia??
    Astonishing... ;-)

    Gerald
     
    Gerald Vogt, Feb 16, 2008
    #39
  20. This is not a library, this is usenet.
    FYI: Timbuktu is the captial of the region Timbuktu in Mali.
     
    rodney.usenet, Feb 16, 2008
    #40
    1. Advertisements

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments (here). After that, you can post your question and our members will help you out.