How To Armor-Up Windows Firewall - Page 2
Page 2 of 2 FirstFirst 12
Results 11 to 20 of 20

Thread: How To Armor-Up Windows Firewall

  1. #11
    Junior Member
    Join Date
    Dec 2005
    Posts
    1
    As for 3rd party software I'd point to Core FORCE which is a Windows port of the PF firewall from OpenBSD unix, it provides an inbound and outbound stateful packet filter with advanced features (filtering per application, tcp flags, icmp type, ask user dialog, logging, etc). Plus it can be used to configure permissions for files and registry keys as well.
    the interface and configuration is not for the inexpert user tho.
    http://force.coresecurity.com

  2. #12
    Junior Member
    Join Date
    Dec 2005
    Posts
    1
    As for 3rd party software I'd point to Core FORCE which is a Windows port of the PF firewall from OpenBSD unix, it provides an inbound and outbound stateful packet filter with advanced features (filtering per application, tcp flags, icmp type, ask user dialog, logging, etc). Plus it can be used to configure permissions for files and registry keys as well.
    the interface and configuration is not for the inexpert user tho.
    http://force.coresecurity.com

  3. #13
    Senior Member
    Join Date
    Dec 2003
    Location
    Pacific Northwest
    Posts
    1,675
    corrupted_code,

    These comments are meant to be constructive in nature with the intent of helping you with the presentation side of your tutorial. Some apply and others are just comments of a general nature.

    First and foremost, Spelling and Grammar does count! It is a direct reflection of attention to detail, knowledge, and creditability. You are writing a tutorial that will be posted on the Internet, representing AO, and where almost the whole world can read it. If you want credence given to you and your tutorial, then take the time to prepare it before submitting it. Otherwise I probably wouldn't read past the first paragraph and the BS Flag would be hoisted.

    Write, not to the Noob! If you do, it is a direct indication that you do not know your subject matter.

    When writing about a complicated process, use the correct terms and phrases. However present them as simply as possible. Don't bore the reader by using words you had to look up. You want him/her learning from the information you are presenting and not spending their time looking up non-technical terms.

    Study the section on writing Tutorials so you won't find yourself in the shame pit that many fall into. Search through some the tutorials that have already been written, making note of their presentation and format etc. There are a multitude of outstanding ones.

    Anyway, hope that helps you some.

    cheers
    Connection refused, try again later.

  4. #14
    Senior Member
    Join Date
    Dec 2003
    Location
    Pacific Northwest
    Posts
    1,675
    corrupted_code,

    These comments are meant to be constructive in nature with the intent of helping you with the presentation side of your tutorial. Some apply and others are just comments of a general nature.

    First and foremost, Spelling and Grammar does count! It is a direct reflection of attention to detail, knowledge, and creditability. You are writing a tutorial that will be posted on the Internet, representing AO, and where almost the whole world can read it. If you want credence given to you and your tutorial, then take the time to prepare it before submitting it. Otherwise I probably wouldn't read past the first paragraph and the BS Flag would be hoisted.

    Write, not to the Noob! If you do, it is a direct indication that you do not know your subject matter.

    When writing about a complicated process, use the correct terms and phrases. However present them as simply as possible. Don't bore the reader by using words you had to look up. You want him/her learning from the information you are presenting and not spending their time looking up non-technical terms.

    Study the section on writing Tutorials so you won't find yourself in the shame pit that many fall into. Search through some the tutorials that have already been written, making note of their presentation and format etc. There are a multitude of outstanding ones.

    Anyway, hope that helps you some.

    cheers
    Connection refused, try again later.

  5. #15
    Once again, thanks for the advice Relyt. The guide has been edited and reworded for proper grammer and spelling. Also thanks for providing other products that I've missed spamdies and wari. If anybody still has comments/addons feel free to continue as I am open to suggestions on edits.
    Come to the dark side......WE.....HAVE......trackingCOOKIES!!

  6. #16
    Once again, thanks for the advice Relyt. The guide has been edited and reworded for proper grammer and spelling. Also thanks for providing other products that I've missed spamdies and wari. If anybody still has comments/addons feel free to continue as I am open to suggestions on edits.
    Come to the dark side......WE.....HAVE......trackingCOOKIES!!

  7. #17
    AO's MMA Fanatic! Computernerd22's Avatar
    Join Date
    Mar 2003
    Location
    Miami, FL
    Posts
    769
    Most people use a 3rd party firewall that has 'inbound monitoring'

    and 'outbound monitoring,' so no need to run all the extra programs.
    Most 3rd party firewalls disable Windows Firewall aswell. Me

    personally I would just disable ICF, and get a good 3rd party

    software like Agnitum Outpost. It has prebuilt rules which means:

    Firewall Rules can be used to allow or deny traffic.

    There are a few things to keep in mind which really apply to

    computer security common sense, such as:

    -Use a secure web browser, such as FireFox (FF) or Opera instead of

    Internet Explorer (IE)
    .
    I have to disagree with the above statement simply because
    IE has one major advantage over many of the freeware

    browsers
    —it's easy to centrally control using Active Directory. Again, cannot do this with Firefox or Opera.

    With AD locking down IE's configuration, you'll limit your users from

    damaging themselves and your network. In order to do this, you'll

    need to create a Group Policy.

    You should have a look here:

    http://redmondmag.com/features/artic...itorialsID=520


    One of the main disadvantages of using the Mozilla Foundation FireFOX

    open-source browser is that several web pages and services were built

    for Internet Explorer compatibility, which is why FireFox users

    sometimes get browsing errors.


    Compatibility: Some webpages which do not follow the W3C

    standards only work properly with Internet Explorer.

    and configuring / tweaking IE can make a pretty secure web browser .

    Cheers,
    thesims

  8. #18
    AO's MMA Fanatic! Computernerd22's Avatar
    Join Date
    Mar 2003
    Location
    Miami, FL
    Posts
    769
    Most people use a 3rd party firewall that has 'inbound monitoring'

    and 'outbound monitoring,' so no need to run all the extra programs.
    Most 3rd party firewalls disable Windows Firewall aswell. Me

    personally I would just disable ICF, and get a good 3rd party

    software like Agnitum Outpost. It has prebuilt rules which means:

    Firewall Rules can be used to allow or deny traffic.

    There are a few things to keep in mind which really apply to

    computer security common sense, such as:

    -Use a secure web browser, such as FireFox (FF) or Opera instead of

    Internet Explorer (IE)
    .
    I have to disagree with the above statement simply because
    IE has one major advantage over many of the freeware

    browsers
    —it's easy to centrally control using Active Directory. Again, cannot do this with Firefox or Opera.

    With AD locking down IE's configuration, you'll limit your users from

    damaging themselves and your network. In order to do this, you'll

    need to create a Group Policy.

    You should have a look here:

    http://redmondmag.com/features/artic...itorialsID=520


    One of the main disadvantages of using the Mozilla Foundation FireFOX

    open-source browser is that several web pages and services were built

    for Internet Explorer compatibility, which is why FireFox users

    sometimes get browsing errors.


    Compatibility: Some webpages which do not follow the W3C

    standards only work properly with Internet Explorer.

    and configuring / tweaking IE can make a pretty secure web browser .

    Cheers,
    thesims

  9. #19
    Junior Member
    Join Date
    Jan 2006
    Posts
    1
    Where is da tutorial?????

  10. #20
    Junior Member
    Join Date
    Jan 2006
    Posts
    1
    Where is da tutorial?????

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides