C
Charlie
I would like to use Sygate Personal FW again as I really liked it. However I
do not know how to determine which outbound access requests to honor and
which to consider threatening. I expect these requests after program
updates etc and can deal with those usually. Some outbound requests seem to
me to occur at unpredictable times...it is those especially with cryptic
names that are still baffling me as I feel I might unknowingly let a threat
through. I am not an IT professional...but a performing artist.
How is the non-technoid person supposed to make an informed decision on
these matters?
I have thus resorted to the WinXP Home built-in F/W and a couple patches
from grc.com and I get all stealth there and elsewhere and no hassle
managing outbound data F/W security decisions. Where's the downside to that
arrangement?
Charlie
do not know how to determine which outbound access requests to honor and
which to consider threatening. I expect these requests after program
updates etc and can deal with those usually. Some outbound requests seem to
me to occur at unpredictable times...it is those especially with cryptic
names that are still baffling me as I feel I might unknowingly let a threat
through. I am not an IT professional...but a performing artist.
How is the non-technoid person supposed to make an informed decision on
these matters?
I have thus resorted to the WinXP Home built-in F/W and a couple patches
from grc.com and I get all stealth there and elsewhere and no hassle
managing outbound data F/W security decisions. Where's the downside to that
arrangement?
Charlie