-
January 14th, 2006, 11:33 PM
#11
Junior Member
As for 3rd party software I'd point to Core FORCE which is a Windows port of the PF firewall from OpenBSD unix, it provides an inbound and outbound stateful packet filter with advanced features (filtering per application, tcp flags, icmp type, ask user dialog, logging, etc). Plus it can be used to configure permissions for files and registry keys as well.
the interface and configuration is not for the inexpert user tho.
http://force.coresecurity.com
-
January 14th, 2006, 11:33 PM
#12
Junior Member
As for 3rd party software I'd point to Core FORCE which is a Windows port of the PF firewall from OpenBSD unix, it provides an inbound and outbound stateful packet filter with advanced features (filtering per application, tcp flags, icmp type, ask user dialog, logging, etc). Plus it can be used to configure permissions for files and registry keys as well.
the interface and configuration is not for the inexpert user tho.
http://force.coresecurity.com
-
January 14th, 2006, 11:57 PM
#13
corrupted_code,
These comments are meant to be constructive in nature with the intent of helping you with the presentation side of your tutorial. Some apply and others are just comments of a general nature.
First and foremost, Spelling and Grammar does count! It is a direct reflection of attention to detail, knowledge, and creditability. You are writing a tutorial that will be posted on the Internet, representing AO, and where almost the whole world can read it. If you want credence given to you and your tutorial, then take the time to prepare it before submitting it. Otherwise I probably wouldn't read past the first paragraph and the BS Flag would be hoisted.
Write, not to the Noob! If you do, it is a direct indication that you do not know your subject matter.
When writing about a complicated process, use the correct terms and phrases. However present them as simply as possible. Don't bore the reader by using words you had to look up. You want him/her learning from the information you are presenting and not spending their time looking up non-technical terms.
Study the section on writing Tutorials so you won't find yourself in the shame pit that many fall into. Search through some the tutorials that have already been written, making note of their presentation and format etc. There are a multitude of outstanding ones.
Anyway, hope that helps you some.
cheers
Connection refused, try again later.
-
January 14th, 2006, 11:57 PM
#14
corrupted_code,
These comments are meant to be constructive in nature with the intent of helping you with the presentation side of your tutorial. Some apply and others are just comments of a general nature.
First and foremost, Spelling and Grammar does count! It is a direct reflection of attention to detail, knowledge, and creditability. You are writing a tutorial that will be posted on the Internet, representing AO, and where almost the whole world can read it. If you want credence given to you and your tutorial, then take the time to prepare it before submitting it. Otherwise I probably wouldn't read past the first paragraph and the BS Flag would be hoisted.
Write, not to the Noob! If you do, it is a direct indication that you do not know your subject matter.
When writing about a complicated process, use the correct terms and phrases. However present them as simply as possible. Don't bore the reader by using words you had to look up. You want him/her learning from the information you are presenting and not spending their time looking up non-technical terms.
Study the section on writing Tutorials so you won't find yourself in the shame pit that many fall into. Search through some the tutorials that have already been written, making note of their presentation and format etc. There are a multitude of outstanding ones.
Anyway, hope that helps you some.
cheers
Connection refused, try again later.
-
January 15th, 2006, 03:11 AM
#15
Once again, thanks for the advice Relyt. The guide has been edited and reworded for proper grammer and spelling. Also thanks for providing other products that I've missed spamdies and wari. If anybody still has comments/addons feel free to continue as I am open to suggestions on edits.
Come to the dark side......WE.....HAVE......trackingCOOKIES!!
-
January 15th, 2006, 03:11 AM
#16
Once again, thanks for the advice Relyt. The guide has been edited and reworded for proper grammer and spelling. Also thanks for providing other products that I've missed spamdies and wari. If anybody still has comments/addons feel free to continue as I am open to suggestions on edits.
Come to the dark side......WE.....HAVE......trackingCOOKIES!!
-
January 16th, 2006, 11:18 AM
#17
Most people use a 3rd party firewall that has 'inbound monitoring'
and 'outbound monitoring,' so no need to run all the extra programs.
Most 3rd party firewalls disable Windows Firewall aswell. Me
personally I would just disable ICF, and get a good 3rd party
software like Agnitum Outpost. It has prebuilt rules which means:
Firewall Rules can be used to allow or deny traffic.
There are a few things to keep in mind which really apply to
computer security common sense, such as:
-Use a secure web browser, such as FireFox (FF) or Opera instead of
Internet Explorer (IE).
I have to disagree with the above statement simply because
IE has one major advantage over many of the freeware
browsers—it's easy to centrally control using Active Directory. Again, cannot do this with Firefox or Opera.
With AD locking down IE's configuration, you'll limit your users from
damaging themselves and your network. In order to do this, you'll
need to create a Group Policy.
You should have a look here:
http://redmondmag.com/features/artic...itorialsID=520
One of the main disadvantages of using the Mozilla Foundation FireFOX
open-source browser is that several web pages and services were built
for Internet Explorer compatibility, which is why FireFox users
sometimes get browsing errors.
Compatibility: Some webpages which do not follow the W3C
standards only work properly with Internet Explorer.
and configuring / tweaking IE can make a pretty secure web browser .
Cheers,
thesims
-
January 16th, 2006, 11:18 AM
#18
Most people use a 3rd party firewall that has 'inbound monitoring'
and 'outbound monitoring,' so no need to run all the extra programs.
Most 3rd party firewalls disable Windows Firewall aswell. Me
personally I would just disable ICF, and get a good 3rd party
software like Agnitum Outpost. It has prebuilt rules which means:
Firewall Rules can be used to allow or deny traffic.
There are a few things to keep in mind which really apply to
computer security common sense, such as:
-Use a secure web browser, such as FireFox (FF) or Opera instead of
Internet Explorer (IE).
I have to disagree with the above statement simply because
IE has one major advantage over many of the freeware
browsers—it's easy to centrally control using Active Directory. Again, cannot do this with Firefox or Opera.
With AD locking down IE's configuration, you'll limit your users from
damaging themselves and your network. In order to do this, you'll
need to create a Group Policy.
You should have a look here:
http://redmondmag.com/features/artic...itorialsID=520
One of the main disadvantages of using the Mozilla Foundation FireFOX
open-source browser is that several web pages and services were built
for Internet Explorer compatibility, which is why FireFox users
sometimes get browsing errors.
Compatibility: Some webpages which do not follow the W3C
standards only work properly with Internet Explorer.
and configuring / tweaking IE can make a pretty secure web browser .
Cheers,
thesims
-
January 16th, 2006, 07:19 PM
#19
Junior Member
Where is da tutorial?????
-
January 16th, 2006, 07:19 PM
#20
Junior Member
Where is da tutorial?????
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|