You are here: hacking technology > firewall > Content
Hot Articles
Recommend Articles
New Articles
Individual firewall's truth
  Add date: 07/11/2008   Publishing date: 07/11/2008   Hits: 317
Total 10 pages, Current page:1, Jump to page:
 
Has many kinds of ways to protect your computer to be exempt from the malicious software's violation, for instance software firewall, viral and Rootkit examination software and so on. All these protection software based on some well known and does not have the improvement technology nearly, perhaps moreover these technologies you already knew, inherits these technical the security product is also imperfect. Such consequence usually is fearful. However these security company actually naive thought that their product is most advanced, has contained the newest characteristic, is the user is necessary. So long as but you by theirs magnificent coat will see that their Bug and wrong even must be more than you in the school design. What although produces a model of product most important is good and the powerful advertisement. But the heavy advertisement and the bad test unify in can the user demonstrate that together some products so-called formidable, can cause it to have one kind of intense purchase desire? Certainly is not good.

Protects your personal computing to be exempt from exterior and the internal third party's attack is a great idea. Some protect your PC is far away from the wooden horse and the spy software “heuristic” the method probably really in the work. If they work, pays 30 to 50 US dollars can obtain the real-time protection and the renewal indeed is a very good idea. What a pity, they cannot.
First I want for my bad English apology. Our discussion will involve the following product:
ZoneAlarm Firewall 6.x
Outpost Firewall 3.x and 4.x
Look'n'Stop Firewall 2.0
Kerio Firewall 4.3
Sygate Firewall 5.6
Jetico Firewall 1.0
PortsLock Firewall 1.9
Tiny Firewall 6.5
Norton Internet Security 8.0
Comodo Firewall 2.4
OnlineArmor Firewall 2.1
Individual software firewall's protection has 2 kind of basic ranks: NDIS (network actuation interface specification) and TDI (transmission data interface). The NDIS level is the establishment in the TCP/IP stack's foundation, can prevent in this rank's protection based on TCP/IP the stack BUG attack, even you do not need to renew your stack; He can also defend many electronic deceptions, the flood attack and distributional refuses to serve the attack. Has not used the NDIS technology the firewall to turn the conclusion bystander naturally. The loser has the PortsLock firewall, Norton Internet Security, the Comodo firewall and so on. You is really willing to be the PortsLock firewall pays 35 euros, he cannot even resist the low rank the TCP/IP attack. Or is Comodo pays 79 US dollars? Feels sorrowful for yours system. The genuine firewall is based on the NDIS level. Has two different protection methods based on NDIS. The first kind is the NDIS-hooking protection. The main method is Hooks NdisRegisterProtocol()/NdisOpenAdapter(). when the NDIS agreement attempts registers perhaps is just about to binds some adapter, the firewall will receive the notice. In firewall HOOK NDIS_PROTOCOL_BLOCK and NDIS_OPEN_BLOCK handle this critical moment, and works as when system wish transmission or receive data packet, the firewall will be informed, when these will occur time. The firewall is attempting installs when their clasp is interesting, nearly each firewall is the hook NDIS_PROTOCOL_BLOCK handle, but Sygate, exceptions and so on Kerio and Jetico, they are the HOOK NDIS_PROTOCOL_CHARACTERISTICS handles, but is not transfer true NdisRegisterProtocol(), after that they move to the original handle. Safer? Right? Is precisely, the firewall should the independent working, register with how many agreements and how many are bound has nothing to do with. Yes, each firewall supports this. For example, when ZoneAlarm a hook handle, he is assigns a non-paging the memory, and puts in the following several instructions.

 
Other pages: : 1 * 2 * 3 * 4 * 5 * 6 * 7 * 8 * 9 * 10 * Next>>
Prev:Under Linux system firewall's establishment method Next:Establishment firewall initiative network security protection

Comment:

Category: Home > firewall