SpaceSpank
Posts: 244
Joined: 10/3/2010 Status: offline
|
I know what the CIA uses. It's not that impressive. Most government agencies are, in fact, operating with the same crap most other large business use. They just have more regulations on HOW it can be used, where it can be sourced from, etc. Still a "lowest bidder" operation 9/10 times. Exceptions when something goes catastrophically wrong and people throw money at the issue. For the vast majority of people you will not "need" a software firewall, your home router will be good enough. Most of what gets in is not people port scanning your PC and actively sending you exploits that way. It's you clicking on shit, opening e-mail attachments, or browsing compromised web pages with active exploits for software you have loaded (usually flash, java, or something similar). Software firewalls on the consumer level will protect against a miniscule portion of that, if any. Especially if the malware was coded to simply disable it or configure it. Load up antimalware software and get better at cleaner browsing habits (microsoft security essentials + malware bites for occasional scans is a good combo). Loading up more advanced stuff like sandbox and virtualization software is overkill for most. So unless you're going to be running something that is highly targetable (a web server, mail server, etc) or a person of interest... you generally don't need to deal with any of that stuff. Also, if you get a router and it supports UPNP (universal plug n play) disable it. Some malware can actually use that to configure your router to allow external access. This stuff can be incredibly crafty and sneaky. quote:
ORIGINAL: LanceHughes WHAT a fire-wall you'll need! EVERY hacker will be pounding, spearing, phishing, jump-over, sneak-round..... under, fire, water, flood, DOS (denial of server, fool - not disk operating system.) Maybe you should check with your friends at CIA and see what they have software-wise. I once had the pleasure of hearing http://en.wikipedia.org/wiki/Grace_Hopper speak. She closed with some security problems and hints, "But, remember, there is always a way to gain access to any computer." I went up and asked her what she meant by that and she replied, "Just think about it." I have and I know her statement was right (in 1969 or 70) and remains right and will always be right. Red herring: power line used to send pulses and thereby open the computer for access.
|