Hey Shane,
You seem to know quite a bit about this subject, so I want to ask you
this. What is a "Sub 7 Trojan Horse"? That seems to be the tool that
most hackers use to try to access my hard drive. I'll bet 9 out of 10
attempts I get are useing it.
I've been running the Norton IS 2002 because it controlss popups and has
a firewall, how does it rate in your opinion?
Thanks,
Alan S.
> Date: Fri, 01 Feb 2002 10:43:24 -0600
> From: Shane Moseley <smoseley@ix.netcom.com>
> Subject: DML: Re: online hackers
There is not really a big difference between the hardware and software
firewalls (depending on implementation). The hardware versions (Cisco
PIX for example) is just a glorified PC w/Cisco's own OS (IOS) that has
the same kind of rule-based configuration. It does have special ASIC's
that can speed up rule processing but still is based on software. Once
comprimised, it will only let you through faster 8).
The problem is that people like to download little "personal firewalls"
that run under an already vulnerable OS like ANY of Microsoft's
products. Any firewall software running on top of any Microsoft product
is kinda like an oxymoron.
Some hardened versions of Linux and BSDI for example can provide more
protection that what Cisco has to offer.
We have many customers whose systems are comprimised all the time
utilizing a PIX. They run into the same problem as the "personal
firewall" bunch. Easy to understand, easy to install, easy to configure
= easy to comprimise.
Just my $0.02,
Shane
This archive was generated by hypermail 2b29 : Fri Jun 20 2003 - 12:03:57 EDT