On Jun 27, 2007, at 9:16 AM, John Francis wrote: >> I'm not sure why this is a concern. I don't care if an application >> does a check for registration/license. My networking firewall is >> designed to detect and notify me of intrusion attempts from the >> outside, not from connections originating from inside it's >> boundaries. > > So, if you ever get hit by a Trojan Horse, you'll never know about it. > > My firewall software (just like many other similar products) will tell > me about unrecognised connections initiated from inside the firewall.
How does your software discriminate between an authorized connection to a new destination initiated from inside the firewall and an "unrecognised" connection? What are the criteria it uses as a distinction? I have all kinds of things that look outbound for stuff independent of my user process without my having to interact with them. I don't know how I'd tell a firewall what was recognized and what wasn't... G -- PDML Pentax-Discuss Mail List PDML@pdml.net http://pdml.net/mailman/listinfo/pdml_pdml.net