Page 2 of 3 FirstFirst 123 LastLast
Results 21 to 40 of 54

Thread: Re: Firewall Software Recommendations?

  1. #21
    Sebastian G.
    Guest

    Re: Firewall Software Recommendations?

    louise wrote:


    > I'm now using Online Armor free in addition to an NAT
    > Router. I like Online Armor very much and find it's "nags"
    > are clear and informative.



    I find it nags an obvious attack point for a shatter attack.

  2. #22
    David H. Lipman
    Guest

    Re: Firewall Software Recommendations?

    From: "Gary R. Schmidt" <grschmidt@acm.org>


    | And NIC's that offload the processing from the CPU. Intel e1000-based
    | cards do that, among many others, no doubt.
    |
    | Cheers,
    | Gary B-)
    |

    Yesw. I had an Intel NIC that had a RISC i960 CPU that clock doubled the PCI 33MHz bus
    speed to 66MHz and I used in on a Symantec Ghost server. This server NIC gave me great
    performance when distributing Ghost images.

    --
    Dave
    http://www.claymania.com/removal-trojan-adware.html
    Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp



  3. #23
    louise
    Guest

    Re: Firewall Software Recommendations?

    Sebastian G. wrote:
    > louise wrote:
    >
    >
    >> I'm now using Online Armor free in addition to an NAT Router. I like
    >> Online Armor very much and find it's "nags" are clear and informative.

    >
    >
    > I find it nags an obvious attack point for a shatter attack.


    What does that mean? What is a shatter attack?

    Louise

  4. #24
    Sebastian G.
    Guest

    Re: Firewall Software Recommendations?

    louise wrote:

    > Sebastian G. wrote:
    >> louise wrote:
    >>
    >>
    >>> I'm now using Online Armor free in addition to an NAT Router. I like
    >>> Online Armor very much and find it's "nags" are clear and informative.

    >>
    >> I find it nags an obvious attack point for a shatter attack.

    >
    > What does that mean? What is a shatter attack?



    Google and Wikipedia exist...

    (Oh, and in fact, if you never bothered to check your security software for
    the most obvious security vulnerabilities, then you never had any security.)

  5. #25
    Ansgar -59cobalt- Wiechers
    Guest

    Re: Firewall Software Recommendations?

    In comp.security.firewalls louise <louise@invalid.invalid> wrote:
    > Sebastian G. wrote:
    >> louise wrote:
    >>> I'm now using Online Armor free in addition to an NAT Router. I like
    >>> Online Armor very much and find it's "nags" are clear and informative.

    >>
    >> I find it nags an obvious attack point for a shatter attack.

    >
    > What does that mean? What is a shatter attack?


    http://www.just****inggoogleit.com/

    F'up2csf to put an end to this braindead crossposting over five groups.

    cu
    59cobalt
    --
    "If a software developer ever believes a rootkit is a necessary part of
    their architecture they should go back and re-architect their solution."
    --Mark Russinovich

  6. #26
    David H. Lipman
    Guest

    Re: Firewall Software Recommendations?

    From: "Sebastian G." <seppi@seppig.de>

    |
    |
    | Google and Wikipedia exist...
    |
    | (Oh, and in fact, if you never bothered to check your security software for
    | the most obvious security vulnerabilities, then you never had any security.)

    One can check software that has vulnerabilities and if those applications have updates
    through the Secunia Software Inspector. It will identify installed applications that should
    be updated that have not been updated and leave you "at risk".

    http://secunia.com/software_inspector

    --
    Dave
    http://www.claymania.com/removal-trojan-adware.html
    Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp



  7. #27
    Richard Steinfeld
    Guest

    Re: Firewall Software Recommendations?

    Sebastian G. wrote:
    > louise wrote:
    >
    >> Sebastian G. wrote:
    >>> louise wrote:
    >>>
    >>>
    >>>> I'm now using Online Armor free in addition to an NAT Router. I
    >>>> like Online Armor very much and find it's "nags" are clear and
    >>>> informative.
    >>>
    >>> I find it nags an obvious attack point for a shatter attack.

    >>
    >> What does that mean? What is a shatter attack?

    >
    >
    > Google and Wikipedia exist...
    >
    > (Oh, and in fact, if you never bothered to check your security software
    > for the most obvious security vulnerabilities, then you never had any
    > security.)


    What the hell kind of arrogant answer was that?

  8. #28
    louise
    Guest

    Re: Firewall Software Recommendations?

    David H. Lipman wrote:
    > From: "Sebastian G." <seppi@seppig.de>
    >
    > |
    > |
    > | Google and Wikipedia exist...
    > |
    > | (Oh, and in fact, if you never bothered to check your security software for
    > | the most obvious security vulnerabilities, then you never had any security.)
    >
    > One can check software that has vulnerabilities and if those applications have updates
    > through the Secunia Software Inspector. It will identify installed applications that should
    > be updated that have not been updated and leave you "at risk".
    >
    > http://secunia.com/software_inspector
    >


    I do check my software with secunia on a regular basis.

    And I don't understand what is meant by checking your
    security software - I do a shields up check on a regular
    basis, run Nod32 and SuperAntiSpyware along with Spybot on a
    periodic basis.

    I seem to have gotten attacked because I asked a question -
    and the attack assumes I don't take responsibility for my
    own security - there is no basis that I know of for this
    assumption.

    Louise

  9. #29
    Krazee Brenda
    Guest

    Re: Firewall Software Recommendations?

    On Fri, 15 Feb 2008 21:40:34 -0800, Richard Steinfeld wrote:

    > Sebastian G. wrote:
    >> louise wrote:
    >>
    >>> Sebastian G. wrote:
    >>>> louise wrote:
    >>>>
    >>>>
    >>>>> I'm now using Online Armor free in addition to an NAT Router. I
    >>>>> like Online Armor very much and find it's "nags" are clear and
    >>>>> informative.
    >>>>
    >>>> I find it nags an obvious attack point for a shatter attack.
    >>>
    >>> What does that mean? What is a shatter attack?

    >>
    >> Google and Wikipedia exist...
    >>
    >> (Oh, and in fact, if you never bothered to check your security software
    >> for the most obvious security vulnerabilities, then you never had any
    >> security.)

    >
    > What the hell kind of arrogant answer was that?


    TruthWare
    --
    See Brenda's UniWorldWare
    http://tinyurl.com/nm2yt

  10. #30
    Gerald Vogt
    Guest

    Re: Firewall Software Recommendations?

    On Feb 16, 3:37 pm, louise <lou...@invalid.invalid> wrote:
    > And I don't understand what is meant by checking your
    > security software - I do a shields up check on a regular
    > basis, run Nod32 and SuperAntiSpyware along with Spybot on a
    > periodic basis.
    >
    > I seem to have gotten attacked because I asked a question -
    > and the attack assumes I don't take responsibility for my
    > own security - there is no basis that I know of for this
    > assumption.


    Then why do you install all this strange security software? It does
    not take responsibility for your own security.

    Gerald

  11. #31
    Straight Talk
    Guest

    Re: Firewall Software Recommendations?

    On Sat, 16 Feb 2008 01:37:27 -0500, louise <louise@invalid.invalid>
    wrote:

    >And I don't understand what is meant by checking your
    >security software


    Most users don't - which is why security software vendors can get away
    with pushing out highly questionable products of bad quality all the
    time.

    >- I do a shields up check on a regular basis


    Many do. But regarding ShieldsUp - except for the limited ability to
    quickly check if a packet filter of some kind is in place either on
    your own machine or somewhere upstream, it's a useless, hyped up
    promotion tool.

    >run Nod32 and SuperAntiSpyware along with Spybot on a
    >periodic basis.


    Due to the nature of modern malware, scanning is unreliable. What do
    you do to actually prevent bad stuff from getting in in the first
    place?

    >I seem to have gotten attacked because I asked a question -
    >and the attack assumes I don't take responsibility for my
    >own security - there is no basis that I know of for this
    >assumption.


    I don't think anyone questioned whether you take responsibility for
    your own security. Some might have indicated though, that the
    countermeasures you seem to have taken somehow shows that you may lack
    the knowledge to do so properly.

  12. #32
    Bear Bottoms
    Guest

    Re: Firewall Software Recommendations?

    On Sat, 16 Feb 2008 01:10:23 -0600, Straight Talk <b__nice@hotmail.com>
    wrote:

    > I don't think anyone questioned whether you take responsibility for
    > your own security. Some might have indicated though, that the
    > countermeasures you seem to have taken somehow shows that you may lack
    > the knowledge to do so properly.


    I wouldn't know if she does or not. It doesn't really matter as she is
    demonstrating willingness to communicate. I do see you lack communication
    skills, which loses knowledge.

    --
    Bear Bottoms
    Freeware Website http://bearware.info

  13. #33
    Sebastian G.
    Guest

    Re: Firewall Software Recommendations?

    Richard Steinfeld wrote:

    > Sebastian G. wrote:
    >> louise wrote:
    >>
    >>> Sebastian G. wrote:
    >>>> louise wrote:
    >>>>
    >>>>
    >>>>> I'm now using Online Armor free in addition to an NAT Router. I
    >>>>> like Online Armor very much and find it's "nags" are clear and
    >>>>> informative.
    >>>> I find it nags an obvious attack point for a shatter attack.
    >>> What does that mean? What is a shatter attack?

    >>
    >> Google and Wikipedia exist...
    >>
    >> (Oh, and in fact, if you never bothered to check your security software
    >> for the most obvious security vulnerabilities, then you never had any
    >> security.)

    >
    > What the hell kind of arrogant answer was that?



    Well, if we started to explain shatter attacks whenever someone asks...

    Oh, and the fact that his "security" software is full of obvious security
    vulnerabilities is just amusing.

  14. #34
    Sebastian G.
    Guest

    Re: Firewall Software Recommendations?

    louise wrote:

    > I do a shields up check on a regular basis,



    Why? Except for comedian entertainment...

    > I seem to have gotten attacked because I asked a question -
    > and the attack assumes I don't take responsibility for my
    > own security - there is no basis that I know of for this
    > assumption.



    Ouch!

  15. #35
    Bear Bottoms
    Guest

    Re: Firewall Software Recommendations?

    On Sat, 16 Feb 2008 04:54:48 -0600, Sebastian G. <seppi@seppig.de> wrote:

    > shatter attacks


    It is as easy as: Wikipedia:In computing, a shatter attack is a
    programming technique employed by hackers on Microsoft Windows operating
    systems that can be used to bypass security restrictions between processes
    in a session. A shatter attack takes advantage of a design flaw in
    Windows's message-passing system whereby arbitrary code could be injected
    into any other running application or service in the same session, that
    makes use of a message loop. This could result in a privilege escalation
    exploit.

    --
    Bear Bottoms
    Freeware Website http://bearware.info

  16. #36
    Gerald Vogt
    Guest

    Re: Firewall Software Recommendations?

    On Feb 16, 8:48 pm, "Bear Bottoms" <bearbotto...@gmai.com> wrote:
    > On Sat, 16 Feb 2008 04:54:48 -0600, Sebastian G. <se...@seppig.de> wrote:
    > > shatter attacks

    >
    > It is as easy as: Wikipedia:In computing, a shatter attack is a
    > programming technique employed by hackers on Microsoft Windows operating
    > systems that can be used to bypass security restrictions between processes
    > in a session. A shatter attack takes advantage of a design flaw in
    > Windows's message-passing system whereby arbitrary code could be injected
    > into any other running application or service in the same session, that
    > makes use of a message loop. This could result in a privilege escalation
    > exploit.


    If you stood in a library and someone came to you (assuming you are
    not a librarian) and asked you for the name of the capital of
    Timbuktu, you would run and go and pick the next encyclopedia, look it
    up, copy it, and give it to the person in question? You would not just
    wonder whether that person was a little bit crazy or wonder whether
    that person thought you were a librarian and paid for that job? You
    would not tell that person that it should check a encyclopedia??
    Astonishing... ;-)

    Gerald

  17. #37
    rodney.usenet@gmail.com
    Guest

    Re: Firewall Software Recommendations?

    On 16 feb, 13:06, Gerald Vogt <v...@spamcop.net> wrote:
    > On Feb 16, 8:48 pm, "Bear Bottoms" <bearbotto...@gmai.com> wrote:
    >
    > > On Sat, 16 Feb 2008 04:54:48 -0600, Sebastian G. <se...@seppig.de> wrote:
    > > > shatter attacks

    >
    > > It is as easy as: Wikipedia:In computing, a shatter attack is a
    > > programming technique employed by hackers on Microsoft Windows operating
    > > systems that can be used to bypass security restrictions between processes
    > > in a session. A shatter attack takes advantage of a design flaw in
    > > Windows's message-passing system whereby arbitrary code could be injected
    > > into any other running application or service in the same session, that
    > > makes use of a message loop. This could result in a privilege escalation
    > > exploit.

    >
    > If you stood in a library and someone came to you (assuming you are
    > not a librarian) and asked you for the name of the capital of
    > Timbuktu, you would run and go and pick the next encyclopedia, look it
    > up, copy it, and give it to the person in question? You would not just
    > wonder whether that person was a little bit crazy or wonder whether
    > that person thought you were a librarian and paid for that job? You
    > would not tell that person that it should check a encyclopedia??
    > Astonishing... ;-)


    This is not a library, this is usenet.
    FYI: Timbuktu is the captial of the region Timbuktu in Mali.


  18. #38
    Gerald Vogt
    Guest

    Re: Firewall Software Recommendations?

    On Feb 16, 9:53 pm, rodney.use...@gmail.com wrote:
    > On 16 feb, 13:06, Gerald Vogt <v...@spamcop.net> wrote:
    >
    >
    >
    > > On Feb 16, 8:48 pm, "Bear Bottoms" <bearbotto...@gmai.com> wrote:

    >
    > > > On Sat, 16 Feb 2008 04:54:48 -0600, Sebastian G. <se...@seppig.de> wrote:
    > > > > shatter attacks

    >
    > > > It is as easy as: Wikipedia:In computing, a shatter attack is a
    > > > programming technique employed by hackers on Microsoft Windows operating
    > > > systems that can be used to bypass security restrictions between processes
    > > > in a session. A shatter attack takes advantage of a design flaw in
    > > > Windows's message-passing system whereby arbitrary code could be injected
    > > > into any other running application or service in the same session, that
    > > > makes use of a message loop. This could result in a privilege escalation
    > > > exploit.

    >
    > > If you stood in a library and someone came to you (assuming you are
    > > not a librarian) and asked you for the name of the capital of
    > > Timbuktu, you would run and go and pick the next encyclopedia, look it
    > > up, copy it, and give it to the person in question? You would not just
    > > wonder whether that person was a little bit crazy or wonder whether
    > > that person thought you were a librarian and paid for that job? You
    > > would not tell that person that it should check a encyclopedia??
    > > Astonishing... ;-)

    >
    > This is not a library, this is usenet.


    Correct. Google and Wikipedia are still just a click away.

    > FYI: Timbuktu is the captial of the region Timbuktu in Mali.


    I know. It is not extremely difficult to find out if you know how to
    use Google. The wikipedia article is the first hit on google. Just
    like it is the first hit for "shatter attack"...

    Gerald

  19. #39
    Bear Bottoms
    Guest

    Re: Firewall Software Recommendations?

    On Sat, 16 Feb 2008 06:06:37 -0600, Gerald Vogt <vogt@spamcop.net> wrote:

    > On Feb 16, 8:48 pm, "Bear Bottoms" <bearbotto...@gmai.com> wrote:
    >> On Sat, 16 Feb 2008 04:54:48 -0600, Sebastian G. <se...@seppig.de>
    >> wrote:
    >> > shatter attacks

    >>
    >> It is as easy as: Wikipedia:In computing, a shatter attack is a
    >> programming technique employed by hackers on Microsoft Windows operating
    >> systems that can be used to bypass security restrictions between
    >> processes
    >> in a session. A shatter attack takes advantage of a design flaw in
    >> Windows's message-passing system whereby arbitrary code could be
    >> injected
    >> into any other running application or service in the same session, that
    >> makes use of a message loop. This could result in a privilege escalation
    >> exploit.

    >
    > If you stood in a library and someone came to you (assuming you are
    > not a librarian) and asked you for the name of the capital of
    > Timbuktu, you would run and go and pick the next encyclopedia, look it
    > up, copy it, and give it to the person in question? You would not just
    > wonder whether that person was a little bit crazy or wonder whether
    > that person thought you were a librarian and paid for that job? You
    > would not tell that person that it should check a encyclopedia??
    > Astonishing... ;-)
    >
    > Gerald


    LOL...we are not in a Library, and if someone asked a question to a group
    even in a Library...you would expect everyone in the group to go look it
    up for themselves, rather than have one person easily present
    it...astonishing.

    --
    Bear Bottoms
    Freeware Website http://bearware.info

  20. #40
    Bear Bottoms
    Guest

    Re: Firewall Software Recommendations?

    On Sat, 16 Feb 2008 07:00:58 -0600, Gerald Vogt <vogt@spamcop.net> wrote:


    >> This is not a library, this is usenet.

    >
    > Correct. Google and Wikipedia are still just a click away.
    >
    >> FYI: Timbuktu is the captial of the region Timbuktu in Mali.

    >
    > I know. It is not extremely difficult to find out if you know how to
    > use Google. The wikipedia article is the first hit on google. Just
    > like it is the first hit for "shatter attack"...
    >
    > Gerald


    LOL...we are not in a Library, and if someone asked a question to a group
    even in a Library...you would expect everyone in the group to go look it
    up for themselves, rather than have one person easily present
    it...astonishing.


    --
    Bear Bottoms
    Freeware Website http://bearware.info

Similar Threads

  1. Microsoft Windows Malicious Software Removal Tool!
    By fords8 in forum Software Forum
    Replies: 8
    Last Post: 04-06-15, 09:08 AM
  2. Router: Software firewall not Hardware firewall.
    By JMedley1 in forum Broadband Tweaks Help
    Replies: 1
    Last Post: 01-10-07, 06:49 PM
  3. Replies: 2
    Last Post: 09-15-05, 08:46 PM
  4. Software Firewall vs Router Firewall
    By KevinF in forum Wireless Networks & Routers
    Replies: 2
    Last Post: 01-17-05, 06:25 PM

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •