Solved

Firewalls

Posted on 2004-10-07
2
226 Views
Last Modified: 2013-11-16
I used the latest free Sygate firewall on my Win 2Kpro dial-up systems. Now though i have XP pro SP2 with its own invisible firewall...Still dial-up..pffff.
In your opinion which one is more effective?

With the Sygate one I could see what was occuring and had some control but with the XP one everything is invisable

Advice please

TIA
0
Comment
Question by:orbiter5
2 Comments
 

Assisted Solution

by:johnny_road
johnny_road earned 50 total points
ID: 12255457
Hi orbiter5,

Good choice on Sysgate.  If you felt comfortable with that s/w firewall (it's more advanced than some others), I suggest you install Sysgate on your box and then disable XP SP2's firewall.

The biggest issue is that quoting MS: "Windows Firewall will automatically allow all outbound connections, regardless of the program and the user context."  These means outbound access cannot be controlled with the built in firewall.  So, if you have a malicious program reaching out to the Internet, it would be allowed by default.

Here are some firewall related comparisons:
http://www.agnitum.com/php_scripts/compare2.php
http://www.pcflank.com/art41c.htm

Good luck,
JR
0
 
LVL 2

Accepted Solution

by:
kitisak earned 50 total points
ID: 12256030
It depends on users too. If you have firewall knowledge, you should use Sygate. Because it always alerts such as connecting internet,etc. So you can allow only important packet in or out your machine.

If you don't have firewall knowledge much, you should use XP Firewall. Because it 's easy to use and never alert anything. I think it is very friendly for users.
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article outlines the process to identify and resolve account lockout in an Active Directory environment.
In this increasingly digital world, security hacks are no longer just a threat, but a reality. As we've witnessed with Target's big identity hack 2013, Heartbleed in 2015, and now Cloudbleed, companies and their leaders need to prepare for the unthi…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question