XP Firewall

  • Thread starter Thread starter Aido
  • Start date Start date
A

Aido

Hiya Peoples.
I'm new to this Newgroup, So forgive me if this topic has been done to
Death.
I'd like to know how effective the WinXP Firewall is. Any info would be
appreciated.

Aido.
 
Sorry.
My specs are: Laptop running WinXP pro, P4 2g, 512k ram, Nvidia 128meg
graphics.

Aido.
 
Thanks for the info peoples, It's been very informitive.
I had been running Sygate, But the trial time has expired & I haven't
yet updated it, Just wanted to know more about the WinXP firewall first.
I was told by an ex-hacker I did some work for that it's one of the best
out there, He said that Zone Alarm is crap, He's hacked through it in about
5 mins, Sygate took about 1/2hr, He said that any hacker that can't get in
with in 5 mins will ussually try somewhere else.

Aido.
 
Aido;
Everybody has an opinion. But I have not heard any good things about XP's firewall.
It certainly is not one of the best out there, just free.

Internet Firewalls
http://www.microsoft.com/windowsxp/expertzone/columns/northrup/02august12.asp

[Why would you buy third-party firewall software when Windows XP includes ICF for free?
ICF is designed to provide basic intrusion prevention, but doesn't include the rich
features
of a third-party firewall application. Most third-party firewalls protect you from
software
that may violate your privacy or allow an attacker to misuse your computer-features not
found in ICF.]

Zone Alarm, in my opinion, is not crap. I use the free version and have had NOTHING
come in or go out without my permission. I have a cable modem and am online a lot.
I get a lot of reports in the ZA log of all kinds of traffic that has been blocked.
The free part isn't all that bad either. :o) Don't buy a firewall, until you explore all
the
possibilities. Use a free one until you decide. Or keep using a free one.
Keep having fun!
 
Wesley said:
I use the free version and have had NOTHING
come in or go out without my permission.

If you have IE configured (or any program for that matter) to freely access
the internet, you really don't know what you are allowing in and out.
The truth is, as long as there is a connection, you're vulnerable to a hack.
Your "trusted zone" applications can be manipulated by code. And if they
are not trusted, they still can be manipulated when they are being used.
Also, exploits which are given an alias can be sent using valid names,
thereby bypassing a firewall.

If the richest companies with the most sophisticated networks can be
penetrated, clearly, so can we.

I use a Zone Alarm too, but it's really passive security. If I were a target,
I could be exploited rather easily by a whiz kid with a little time.

http://tooleaky.zensoft.com/
 
GK;
I sure made a bold statement, didn't I? I visited http://tooleaky.zensoft.com/
and downloaded and ran tooleaky. I am humbled.

[I could be exploited rather easily by a whiz kid with a little time.] True, but
outside of bots doing the attacking, why would someone waste their time on
you or me? Because we're there? Thanks for the heads up.
Wes

In
 
Back
Top