|
Guys,
Try to understand how Trojans works, the attacker
need to specify a specific port for any Trojan to communicate which uses client
server functionality ( slave and master or whatever). Again, Black Ice provide a
packet filtering and you should configure Black ice to only allow the services
you wanted. Second the latest black ice provide application monitoring, where
you only allow certain apps to run. If any application trying to be executed
without the list of allow apps , Black ice just won't allow it.
Sincerely
Mustapa Khan
|
- Re: cyberwall Plus/Host based Firewall simon chan
- Re: cyberwall Plus/Host based Firewall jacqueline hoe
- Re: cyberwall Plus/Host based Firewall Mustapa Khan
- Re: cyberwall Plus/Host based Firewall Mikael Olsson
- Re: cyberwall Plus/Host based Firewall Mustapa Khan
- Re: cyberwall Plus/Host based Firewall Mustapa Khan
- RE: cyberwall Plus/Host based Firewall Kuff, Hal
- Re: cyberwall Plus/Host based Firewall Mikael Olsson
- RE: cyberwall Plus/Host based Firewall Alex Kvasnytskyy
- RE: cyberwall Plus/Host based Firewall Claussen, Ken
- Re: cyberwall Plus/Host based Firewall Mustapa Khan
- Re: cyberwall Plus/Host based Firewall Mustapa Khan
