× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



I would add that my software FW also detects when an application's EXE
file has changed and forces me to re-authorize it for 'net access.  This
is a nice additional security measure as if a virus did infect my
machine and compromized my browser's executable (for instance), I would
be notified. 

John A. Jones
Americas Security Officer
Jones Lang LaSalle, Inc.
V: +1-630-455-2787 F: +1-312-601-1782
John.Jones@xxxxxxxxxxxxxxxxxxxxxxx

-----Original Message-----
From: Adam Lang [mailto:aalang@xxxxxxxxxxxxxxxxxxxx] 
Sent: Thursday, July 29, 2004 8:23 AM
To: PC Technical Discussion for iSeries Users
Subject: Re: [PCTECH] Need firewall protection,

<routing snip>

What hardware based firewalsl do, by default, let all traffic leave your
network, but onlylet traffic it that was originally initiated by an
internal computer.  Now, you can configure them to block outgoing
traffic and let in some external traffic (like if you want to run a web
server).

The advantage to a software firewall is that it can block based on
application, not port.  Like if you have a two programs that use port
23456.
The software firewall will typically say "programx.exe wants to go
outside on port 23456, allow?" you then say yes.  Then if it says the
same for programB and you don't want it to, you can say no.  If it is a
program you don't expect, then you can go even further and try to find
it and remove it.

The problem with software firewalls is they themselves can be cracked
and subverted easier than hardware based.  All, they tend to impact
system performance.


This email is for the use of the intended recipient(s) only.  If you have 
received this email in error, please notify the sender immediately and then 
delete it.  If you are not the intended recipient, you must not keep, use, 
disclose, copy or distribute this email without the author's prior permission.  
We have taken precautions to minimize the risk of transmitting software 
viruses, but we advise you to carry out your own virus checks on any attachment 
to this message.  We cannot accept liability for any loss or damage caused by 
software viruses.  The information contained in this communication may be 
confidential and may be subject to the attorney-client privilege. If you are 
the intended recipient and you do not wish to receive similar electronic 
messages from us in future then please respond to the sender to this effect.


As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.