Quoting Cheryl Goh ([EMAIL PROTECTED]): > It is only when the user chats on IRC or surfs the web that vulnerabilities > are introduced. By then your personal firewall would have loaded anyway.
... and effectlively opens a back channel into the machine. You are right - controlling services and activities on a machine is the first and most important line of defense, but starting yet another closed-source, un-audited piece of software is pretty contra-productive.
