Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

List of Firewalls Good to Bad


  • Please log in to reply

#1
Brad2

Brad2

    Member

  • Member
  • PipPip
  • 26 posts
I don't know what leak test program was used or the source of this chart.
So, we'll just put those tidbits of information aside for the time being.

What I would like to know is your opinion based on your experience.
What has given you problems for whatever reason. etc.

That, and the chart might be useful.

I'm concerned at how so-called 'Firewalls' only guard against threats coming in.

Seems like once a program latches onto your system, most firewalls will allow it to 'phone home' at will.

:)

Leaktest_1.jpg
  • 0

Advertisements







Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP