?
Solved

Firewall -   Only . Only allow certain .exe on Client Computer to log in.

Posted on 2003-02-24
2
Medium Priority
?
150 Views
Last Modified: 2010-04-13
I am running Windows2000 server., connected to the internet via a router.

I would like to install a firewall to only allow the client logging in to be running my program on THEIR computer.  eg   client.exe

The client.exe program running on their computer will allways be logging in on port 1002., winsock.
My program client.exe has a login to the server which is encrypted, and the program is unable to proceed without
verification.

Unfortunately i will also have to have access, from only my computer, using pcanywhere.

----

Which firewall program would you recommend i buy for this
situation.

----
Appreciate any help
0
Comment
Question by:kennedymr
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 

Accepted Solution

by:
rbelt earned 400 total points
ID: 8013068
First, you will get many suggestions but I personally only use hardware-based firewalls.  At a minimum, use a stateful packet inspection (SPI) firewall (ICSA firewall certified...) if possible.

One problem with running software based firewalls is that there are many factors that the software must take into consideration (i.e. do you have 3 NIC's and an anti-virus software package running on the machine and is there a vulnerability on a particular NIC or 3rd party software package that compromises the system, etc.).  Another problem (particularly on the system that you are trying to protect) is that attacks are being launched directly on the system that you are trying to protect.  

Second, it really depends on how 'good' of a firewall you want, what additional features you really need and how much you want to spend.  Your mentioned requirements are very basic and almost any firewall should be able to fit the bill.  You can spend as little as $80 (Linksys) or as much as you want... I personally use Cisco PIX, SonicWALL and WatchGaurd, but again, you will get many opinions of which is better than the others...

One comment though on your requirement to "only allow the client logging in to be running my program on THEIR computer".  You will most likely be using port forwarding to achieve the results you are looking for and so you will be opening the port (1002) to your server... the problem is that this port could be used for other applications or attacks.  That is one reason to use an SPI firewall.

Hope this helps

//RB
0
 

Author Comment

by:kennedymr
ID: 8020947
Thanks for your advice. , much appreciated
0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Ready to improve network connectivity? Watch this webinar to learn how SD-WANs and a one-click instant connect tool can boost provisions, deployment, and management of your cloud connection.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
This article lists the top 5 free OST to PST Converter Tools. These tools save a lot of time for users when they want to convert OST to PST after their exchange server is no longer available or some other critical issue with exchange server or impor…
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
Suggested Courses
Course of the Month8 days, 16 hours left to enroll

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question