Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

Protowall


  • Please log in to reply

#1
marco_diablo

marco_diablo

    New Member

  • Member
  • Pip
  • 4 posts
Hello!

Firewall and antivirus program are not enough to protect your PC.

Beside use of Spybot Search&Destroy I would like to mention freware called
ProtoWall. It is very good program for IP filtering. It must be used with BlockManager, both free software can be downloaded from:Bluetack
  • 0

Advertisements


#2
Johanna

Johanna

    The Leather Lady

  • Moderator
  • 3,038 posts
This program works by comparing IP addresses to those in its database, and deciding whether to permit communication, like SpywareBlaster, only it seems to have quite a few "bugs". Sensible surfing and a good firewall is probably a better alternative than to risk a BSOD because of this software.

Johanna
  • 0

#3
marco_diablo

marco_diablo

    New Member

  • Topic Starter
  • Member
  • Pip
  • 4 posts
Well, this should use advanced user....
BSOD never happend to me by using last stable version...

Anyhow it is to the users whether to try it or not, and there is the uninstall option for those programs if that helps Czarina....
  • 0

#4
yardiebeing

yardiebeing

    New Member

  • Member
  • Pip
  • 2 posts
I know this is an old thread but I've a question about Protowall if anyone can help

since installing it i have a massive log file of mainly granted packets from a wide range of IP's using many ports on UDP and TCP protocols. I have BitDefender firewall running, and a firewall built into my Router yet none of these connections were picked up by them. Since Protowall isn't blocking them (the IP's of the connections must not be in the blocked list) I have to wonder why my firewalls don't pick them up??

Any suggestion would be appreciated - here's a small portion of a Protowall log:

2005/01/27 10:39:40 [->] non-hostile source (192.168.26.90), access granted [Protocol: UDP - src: 68 / dst: 67]
2005/01/27 10:39:41 [<-] non-hostile destination (207.46.110.12), access granted [Protocol: TCP - src: 1125 / dst: 80]
2005/01/27 10:39:41 [->] non-hostile source (192.168.25.142), access granted [Protocol: UDP - src: 138 / dst: 138]
2005/01/27 10:39:42 [->] non-hostile source (62.75.150.101), access granted [Protocol: TCP - src: 6697 / dst: 1163]
2005/01/27 10:39:42 [->] non-hostile source (192.168.25.143), access granted [Protocol: UDP - src: 138 / dst: 138]
2005/01/27 10:39:44 [->] non-hostile source (192.168.25.169), access granted [Protocol: UDP - src: 137 / dst: 137]
2005/01/27 10:39:44 [->] non-hostile source (192.168.26.29), access granted [Protocol: UDP - src: 137 / dst: 137]
2005/01/27 10:39:44 [->] non-hostile source (192.168.25.108), access granted [Protocol: UDP - src: 138 / dst: 138]
2005/01/27 10:39:45 [->] non-hostile source (192.168.27.61), access granted [Protocol: UDP - src: 138 / dst: 138]
2005/01/27 10:39:46 [->] non-hostile source (192.168.25.107), access granted [Protocol: UDP - src: 137 / dst: 137]
2005/01/27 10:39:49 [<-] non-hostile destination (207.46.110.19), access granted [Protocol: TCP - src: 1352 / dst: 80]
2005/01/27 10:39:50 [->] non-hostile source (192.168.25.153), access granted [Protocol: UDP - src: 137 / dst: 137]
2005/01/27 10:39:50 [->] non-hostile source (192.168.25.177), access granted [Protocol: UDP - src: 137 / dst: 137]
2005/01/27 10:39:50 [->] non-hostile source (192.168.26.158), access granted [Protocol: UDP - src: 138 / dst: 138]
2005/01/27 10:39:50 [->] non-hostile source (192.168.25.119), access granted [Protocol: UDP - src: 68 / dst: 67]
2005/01/27 10:39:53 [->] non-hostile source (192.168.25.168), access granted [Protocol: UDP - src: 138 / dst: 138]
2005/01/27 10:39:55 [<-] non-hostile destination (82.165.31.190), access granted [Protocol: TCP - src: 1353 / dst: 9933]
2005/01/27 10:39:56 [<-] non-hostile destination (66.75.81.8), access granted [Protocol: TCP - src: 1354 / dst: 55301]
2005/01/27 10:39:56 [<-] non-hostile destination (24.121.81.200), access granted [Protocol: TCP - src: 1355 / dst: 6890]
2005/01/27 10:39:57 [->] non-hostile source (192.168.25.163), access granted [Protocol: UDP - src: 138 / dst: 138]
2005/01/27 10:39:57 [<-] non-hostile destination (200.104.29.53), access granted [Protocol: TCP - src: 1356 / dst: 11920]
2005/01/27 10:39:57 [<-] non-hostile destination (61.177.56.254), access granted [Protocol: UDP - src: 8334 / dst: 8080]
2005/01/27 10:39:57 [<-] non-hostile destination (212.204.133.150), access granted [Protocol: TCP - src: 1357 / dst: 17400]
2005/01/27 10:39:58 [<-] non-hostile destination (217.120.240.86), access granted [Protocol: TCP - src: 1358 / dst: 6884]
2005/01/27 10:39:58 [<-] non-hostile destination (217.43.63.46), access granted [Protocol: TCP - src: 1359 / dst: 49999]
2005/01/27 10:39:58 [->] non-hostile source (192.168.25.184), access granted [Protocol: UDP - src: 137 / dst: 137]
2005/01/27 10:39:58 [<-] non-hostile destination (82.38.98.185), access granted [Protocol: TCP - src: 1360 / dst: 55555]
2005/01/27 10:39:59 [<-] non-hostile destination (213.67.222.75), access granted [Protocol: TCP - src: 1361 / dst: 49152]
2005/01/27 10:39:59 [<-] non-hostile destination (24.3.234.53), access granted [Protocol: TCP - src: 1362 / dst: 59992]
2005/01/27 10:39:59 [<-] non-hostile destination (193.77.124.28), access granted [Protocol: TCP - src: 1363 / dst: 1001]
2005/01/27 10:40:00 [->] non-hostile source (192.168.27.179), access granted [Protocol: UDP - src: 137 / dst: 137]
2005/01/27 10:40:00 [<-] non-hostile destination (82.102.59.136), access granted [Protocol: TCP - src: 1364 / dst: 23812]
2005/01/27 10:40:00 [->] non-hostile source (192.168.24.230), access granted [Protocol: UDP - src: 137 / dst: 137]
2005/01/27 10:40:00 [<-] non-hostile destination (82.41.192.117), access granted [Protocol: TCP - src: 1365 / dst: 8729]
2005/01/27 10:40:00 [<-] non-hostile destination (64.53.9.127), access granted [Protocol: TCP - src: 1366 / dst: 49152]



as you can see that log covers just 20 seconds - 20 seconds with that many connects!! What the...!?!?
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP