Well, I thought you could provide some kind of example. Y'know, cite
and defend your statement?
Since when does logic need to be defended? And don't rely on security
by obscurity. Kerio, Sygate and Outpost are just as likely to be
disabled by malware as ZA and the others you mentioned.
I don't need the warm fuzzies, either. <g> I'm suggesting it for
those with small amount of clue.
Just don't place too much confidence in having just one method of
finding malware/spyware infestations.
The latest av offering from KAV, for example, offers multiple methods
of detection, including a intrusion detection module for the clueless.
Their version 6 KIS (Kaspersky Internet Security) requires the fastest
PC available so as to not choke it to death.
Since that's the direction things are going, it's more important than
ever to address prevention and safe hex alternatives.
Those who don't have a clue and refuse to learn prevention are
hopeless. They don't even know enough to stay off the internet
when hit by a worm or RAT. Telling them to use a sw firewall to
alert them to the inevitable infestation is actually just a lot of
arm waving
You can use them for other pertinent reasons too, such as alerting you
each time Internet Exploder starts up. I never use the thing, but some
years ago I was testing a piece of trialware and had forgotten about
it. A few days after the 30-day period, I started the app, and it
immediately opened IE, and went to a web page with my OE default email
address attached to the URL. Since that day, IE is on "the list."
Now, I don't use OE either, so the default address was a mung. But
newbies don't know to do that.
Any app that starts IE is a Trojan. What app was it? I'm sure you
didn't have IE as your default browser.
If I ever found such a Trojan, I'd submit it to Kaspersky and others
so they could offer detection.
BTW, if you never use OE, how could it have your email addy?
Art
http://home.epix.net/~artnpeg