On Sat, Apr 10, 2010 at 10:20 AM, Brian Lloyd <brian-wb6...@lloyd.com>wrote:

>
>
> On Sat, Apr 10, 2010 at 9:33 AM, Lazy Senior <lazysen...@verizon.net>wrote:
>
>> Baloney.
>>
>> Hardware Firewalls are good. But they protect you only from incoming.
>>
>> A good software firewall protects incoming and OUTGOING. You will be
>> surprised how many programs call "home" after running a software firewall
>> that does outgoing.  Note that most free Microsoft Firewalls only do
>> incoming protection which is useless if you already have a hardware
>> Firewall.
>>
>
> A hardware firewall box can also filter and flag outbound traffic. Outgoing
> firewalls are needed when a machine has already been compromised and you
> want to trap those packets to let you know. A properly-behaving application
> does not "phone home". My firewall is one of my primary sources of
> information about compromised machines in my networks.
>
> But there is another side to this -- if the software (firewall) lives in
> the same machine that has been compromised, then the software that
> compromised the machine can also modify the behavior of the outbound
> firewall, thus giving you a false sense of security. The black-hats already
> put in code to subvert antivirus programs and software firewalls so you
> cannot count on them if they are running on the compromised platform.
>
> Unlike many, I multitask while using PSDR. I have used both Norton 2010 and
>> Comodo Internet Security virus/firewall programs. NEITHER affects PSDR in a
>> negative way.
>> No I do NOT sit around and use PSDR and run DPC checker, fretting about my
>> DPC level. As long as PSDR runs properly I don't care what the DPC level is.
>> If DPC's jump up a couple of hundred while going to eham.net I really do
>> not care as it does not affect PSDR operation.
>>
>
> Well, we are talking about apples and oranges here. One part is how to
> secure the machine and the other part is how to make PSDR run properly.
> There is some overlap but they really are different problems. Neal brings up
> a significant point and that is that the client machine is the wrong place
> to put the firewall. You really need a separate machine to analyze traffic
> for signs that indicate that a machine has been compromised. You cannot
> count on a compromised machine to tell you it has been compromised. That is
> the basic fallacy of the antivirus and firewall software model. (This is
> coming from someone who has learned a lot about Internet security from being
> in the trenches for over 30 years, including having been one of Mitnick's
> victims in the very early '90s.)
>
> Counting on a compromised computer to report that fact to you is akin to a
> store owner basing his anti-theft system on an employee standing at the
> front door and asking exiting customers, "did you steal anything?"
>
>
>>
>> Use an older pc to protect your home network? Come on be serious.
>>
>
> Absolutely. It works just peachy as a firewall, traffic-shaping, and
> activity-reporting engine. When you aren't trying to do high-speed GUI, DSP,
> and n-deep layers of backward compatibility, you will find that there are
> ample cycles in these older machines to do the job. Remember, this is an
> 'enough' problem. You only need enough CPU cycles and enough memory to get
> the job done. You can push right up to 100% utilization without any problems
> as long as you don't go over.
>
> Case in point, one of my networks is being protected by a 486-class
> machine. I monitor its utilization. So far, no problems and no apparent
> delays in spite of the machine doing both firewall and traffic shaping
> functions.
>
> --
> 73 de Brian, WB6RQN/J79BPL
>
>


-- 
73 de Brian, WB6RQN/J79BPL
_______________________________________________
FlexRadio Systems Mailing List
FlexRadio@flex-radio.biz
http://mail.flex-radio.biz/mailman/listinfo/flexradio_flex-radio.biz
Archives: http://www.mail-archive.com/flexradio%40flex-radio.biz/
Knowledge Base: http://kc.flex-radio.com/  Homepage: http://www.flex-radio.com/

Reply via email to