Solved

Firewall headaches when traveling in non secure locations - arrrggh!

Posted on 2006-11-19
3
200 Views
Last Modified: 2013-11-16
I recently purchased a Toshiba portege. Windows XP Pro. Fingerprint security. The My Safe fingerprint secured drive included also.

However, I had dodgy programs or viruses on my pen drive which infected the My Safe drive itself. I was quite shocked.

I also found, while staying in a hotel with Wifi, that I lost control of the computer. Blue tooth and also Wifi connections that I HAD NOT installed work running. Zone Alarm did not pick that up.  

I have sensitive information which I don't want accessed, at any cost. I can afford to purchase whatever is necessary to ensure safety. I am a freelance writer, traveling frequently through developing countries, and security is paramount given the terrible state of most computer networks I have to access.

I reformatted the hard drive but I haven't touched it yet. What is the best firewall for a novice? I am looking at Outpost Pro or again ZoneAlarm pro.

What is the best solution to this?

What are the Wifi hotkeys and why do they keep working by themselves? When I had Zone Alarm going it lists programs active - this had the green light next to it. Yet I hadn't done a thing.

Also, every time i turned the lap top on last week more new programs were listed as being monitored by Zone Alarm. That is, at first count it was 130 but by the end of the week it was 190 something? How?

Thank you.
0
Comment
Question by:finallyjoining
  • 2
3 Comments
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 200 total points
ID: 17977609
Zonealarm is a perfectly good product, straightforward and does what it suggests it does. The two times I have found that it has 'failed' although that is debateable have been when it has prompted to allow/deny a service that the user has not necessarily identified. svhost is a prime example as it is not descriptive enough for a user to make an informed judgement on its impact.

Zonealarm monitors internal processes as well as external so if you kicked off programs that had not been used before but could interact with the Internet then these would be added. It also depends on how you set up the zones; trusted, Internet etc.

Not sure on WiFi keys as I have not come across them. My organisation uses Toshiba as the standard laptop (both the Tecra M5 and the Portege M300) but I have not heard mention of these keys.

Regards
Keith
0
 
LVL 51

Assisted Solution

by:Keith Alabaster
Keith Alabaster earned 200 total points
ID: 17978597
OK. Found the reference to the hotkeys in the drivers CD. They are simple auto-launch items such as Function - F8 etc. (If you look on the F8 key you will see the wireless symbol.
0
 
LVL 9

Assisted Solution

by:tim1731
tim1731 earned 50 total points
ID: 17999609
http://www.sunbelt-software.com/Kerio.cfm as a firewall + green border as a virtual web browser
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now