Quoting Cheryl Goh ([EMAIL PROTECTED]):

> It is only when the user chats on IRC or surfs the web that vulnerabilities
> are introduced. By then your personal firewall would have loaded anyway.

... and effectlively opens a back channel into the machine. You are
right - controlling services and activities on a machine is the first
and most important line of defense, but starting yet another
closed-source, un-audited piece of software is pretty
contra-productive.

Reply via email to