Best security package? (a-v, firewall ect in 1)

  • Thread starter Thread starter Deb Smith
  • Start date Start date
From: "Deb Smith" <[email protected]>

| What does everyone think is the best security package going?
|

There is NO all-in-one. The objective is to grab "best in class" and use each accordingly.
 
David said:
From: "Eugene F." <[email protected]>

| Dave,
|
| What about "Kaspersky Internet Security 6.0 "?

The AV is excellent. However I can't speak for the FireWall.


I can. It is easy to use and passes all tests from Gibson research with
flying colors.
 
So, isn't KIS 6 a contender for the subject title then?

================================================
 
Eugene said:
So, isn't KIS 6 a contender for the subject title then?

Not in comp.security.firewalls, because firewalls and "Internet
Security" suites are mutually exclusive. Same goes for security.

It's hard to express your lack of qualification any better. :-)

Easy to use is totally wrong, your cannot even refer to TCP states in
your rules. I'd consider it unusable.
And we all know that Gibson is a joke.
 
And we all know that Gibson is a joke.

I don't see this. I think he is a an expert in his own field. He
certainly has been right about many present day security issues.
 
Ian said:
I don't see this. I think he is a an expert in his own field.

OK, he's a joke on terms of his claimed field "security". Of course he's
an expert on marketing.
He certainly has been right about many present day security issues.

Like raw sockets? ;-D

Guess you're really not aware of the bullshit Gibson is telling. Just
read a bit on http://grcsucks.com/ for some real expert view on things.
 
Sebastian,

Do you have anything against Kaspersky "anti-hacker" tool in particular
or are just broadcasting your opinion that personal software firewalls
are incapable to provide any security?

===================================
 
Eugene said:
Do you have anything against Kaspersky "anti-hacker" tool in particular
or are just broadcasting your opinion that personal software firewalls
are incapable to provide any security?

In particular it's remotely vulnerable to SYN flooding, UDP flooding,
ICMP flooding and tunneling with reassembly of overlapping IP fragments.
Locally it creates a privilege escalation with shatter attacks.

Oh, and it's totally broken from both a network and a firewall
management perspective, not even allowing to do the simplest common
stateful rules (like not replying to a SYN on TCP/UDP ports < 1024
except stateful related ones).
 
From: "Ian Kenefick" <[email protected]>

| On Mon, 05 Jun 2006 23:51:27 +0200, Sebastian Gottschalk
|
| I don't see this. I think he is a an expert in his own field. He
| certainly has been right about many present day security issues.
|

Ian he is a scare monger at best. Additionally he made his early money by selling a disk
utility to change the interleave of MFM/RLL hard disks when there were many free utilities
to do so.
 
David said:
Ian he is a scare monger at best. Additionally he made his early
money by selling a disk utility to change the interleave of MFM/RLL
hard disks

Since when does SpinRite do so? It's simply an fsck/scandisk/chkdsk
clone with some pseudo-science added for creating random bitstreams
instead of zeroing defective data blocks. It doesn't send any specific
IDE or SCSI commands to allow some more raw data access, especially you
won't get access to any defective block or its raw data.
 
From: "Sebastian Gottschalk" <[email protected]>

| David H. Lipman wrote:
||
| Since when does SpinRite do so? It's simply an fsck/scandisk/chkdsk
| clone with some pseudo-science added for creating random bitstreams
| instead of zeroing defective data blocks. It doesn't send any specific
| IDE or SCSI commands to allow some more raw data access, especially you
| won't get access to any defective block or its raw data.

Since MFM/RLL drives were around, circa ST225.
Remember when you would run DEBUG and enter; g=c800:5 ?

I do. I built enough system for a VAR back then :-)
 
Back
Top