Solved

Question for SunBow

Posted on 2002-03-20
4
188 Views
Last Modified: 2010-04-11
Thanks for your assistance in Q#20275781
0
Comment
Question by:Jerryleo
  • 3
4 Comments
 
LVL 24

Expert Comment

by:SunBow
ID: 6885896
15 pts! Alright! (PAQ rounds info down)
Back in a minute to answer.
0
 
LVL 24

Accepted Solution

by:
SunBow earned 15 total points
ID: 6885912
for:
"Is it necessary to install IDS if the machine has run a firewall? "
http://www.experts-exchange.com/questions/Q.20275781%20html
"I installed the BlackICE Defender on a machine which has run Tiny Personal Firewall. ...(etc)"

Provided some links, discussion IDS vs firewall, and exceptions...

0
 

Author Comment

by:Jerryleo
ID: 6887405
Thank you for your kind help
0
 
LVL 24

Expert Comment

by:SunBow
ID: 6887847
AnyTime.                                           Enjoy    :o)
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question