|
I would then stop using that site that is using unencrypted logins if your information is important. A firewall isn't going to stop home page take overs. A 233 and 128 MB RAM, you are going to have slow going with the internet in general, for a lot of sites. Granted there are some software based firewalls with small footprints, but they still tend to be resource hogs, to a degree, especially if you are running anti-virus in conjunction. ----- Original Message ----- From: "Dan Bale" <dbale@xxxxxxxxxxxxx> To: <pctech@xxxxxxxxxxxx> Sent: Thursday, July 29, 2004 4:39 PM Subject: [PCTECH] How to stop "phone-home" activity? > Thanks everyone! > > I feel so much better about my router/firewall setup now! > > But I'd still like to address "phone-home" activities. I tell the family > units that use the home PC to behave while online and, while I believe their > intentions are always good, the boys tend to find sites related to Game Boys > and Playstation and Pokemon and Digimon that throw back a lot of junk. > Before the HW firewall was added, one of these sites became the > non-benevolent dictator of our browser's home page -- even after we changed > the settings, it didn't stick. (I think SpyBot S&D finally got rid of it.) > > For this reason, I still have my guard up, even though you guys have > convinced me about the HW firewall capabilities. > > Since I do a lot of financial activity online, I try to be extremely > cautious. Surprisingly, one of the web sites I visit a lot allows logging > in from an unsecure page. While not directly financial-related in nature, > it gets into personal info that I'd prefer to treat just as I would my > financial matters. (I get to a secured login page by entering in a bogus ID > & PW on the unsecured one.) My current bank requires a login ID of my > social security number, which drives me bonkers! > > So, one of the features that I was thinking a software firewall would offer > is the ability to monitor all outbound traffic. And stop & interrogate the > traffic that I didn't recognize as something I initiated. > > Jim Franz mentioned "I use Zone Alarm Pro and have no problem w/Live Update. > But I set it to where I have to approve every connection." Doesn't this get > to be time-consuming? And how easy/difficult is it to identify the > application that is sending and/or the data that is sent? > > John Jones mentions that his software firewall "detects when an > application's EXE > file has changed and forces me to re-authorize it for 'net access." Might I > ask which firewall app does this? > > The other consideration I have is performance. This is a 233MHz CPU with > 128MB of RAM, running Win98SE. > > BTW, the reason I don't completely trust detectors for keyloggers and their > ilk is that they only recognize them by known signatures. If there was a > way to trap the behavior of keyloggers in general, I'd be interested. > > tia, > db > > -- > This is the PC Technical Discussion for iSeries Users (PcTech) mailing list > To post a message email: PcTech@xxxxxxxxxxxx > To subscribe, unsubscribe, or change list options, > visit: http://lists.midrange.com/mailman/listinfo/pctech > or email: PcTech-request@xxxxxxxxxxxx > Before posting, please take a moment to review the archives > at http://archive.midrange.com/pctech.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.