![]() |
S/w firewalls
If I'm using XP's firewall (yeh I know it only controls inbounds) with a Linksys BEFSR41 router (built in NAT), do I REALLY need a software firewall ?? :dozey:
|
Re: S/w firewalls
i find that my routers firewall is sufficient enuff, but can help having both... to be sure to be sure :D
|
Re: S/w firewalls
Using Zone Alarm (Free Version)
|
Re: S/w firewalls
Quote:
|
Re: S/w firewalls
Quote:
That said (this may be dubious advice so 'at your own risk etc').... I have not run a software firewall for years being behind a locked down router. I have no issues with spyware or trojans at all as I'm very careful where I surf and what programs I use. |
Re: S/w firewalls
If you keep your system clean and scan for nasties regularly you can do without a software firewall.
If however you don't know what is running on your PC or have no interest in controlling background apps yourself manually then a software firewall comes in handy ;) Quote:
|
Re: S/w firewalls
Windows Firewall, as far as I recall, doesn't do much (if any) control over outgoings, while the router does a pretty good job of stopping incomings - stops 'em all, unless you tell it to make holes for things.
There are quite a few free ones that offer more control than the Windows firewall, as behind a router, the software firewall has a role which is more administrative that protective - well, stopping unwanted connect-outs that may indicate undisclosed adware/spyware. http://www.firewallleaktester.com/tests.php - Jetico free came top in this leaktest, doing best at stopping the various surreptitious ways that things can try to piggyback on allowed connections, though you are only likely to be "leaked" if you have already been infected by leaky malware - lets say some trojan has got in, got your credit card number, and wants to send it back to its master... The "classic" leak would be to co-opt Internet explorer in some way, and then access the fraudster's website with the information in a ? parameter. The DNS method, would be to direct a DNS request to the fraudster's server, with the name of the site requsted being the information ... the "basic" protection in many firewalls for this is a bar on long/malformed DNS requests - the complex way is user specified DNS rules, so only the legitimate DNS server can be used. Have I scared you yet? Seriously, all this requires that you are ALREADY COMPROMISED, and could be considered to be locking the stable door while the horse is trying to bolt through it. |
All times are GMT +1. The time now is 12:53. |
Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2025, vBulletin Solutions Inc.
All Posts and Content are © Cable Forum