Jump to content

plumbee

Members
  • Posts

    4
  • Joined

  • Last visited

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

plumbee's Achievements

Newbie

Newbie (1/14)

  1. That seems like it would be really simple to get around, redireting traffic to port 80 or some other unblocked port..... I have heard some stuff about traffic shaping to block bit torrent, but remember, you can use bittorrent for more than Brintney Spears and Metalica, as we discuss this on an IPTV forum page. Anyone use University or similar Wifi? Tim
  2. I am sure everyone saw the news that San Fran was going to Muni WiFi. I have a dumb question. How in the world will users authenticate? I mean, lets say it is a truely open, insecure, wireless network. Anybody with a NIC can connect. The only thing that would/could personally identify a PC would me the MAC address, right? Being as it is trivial to spoof a MAC address, i can't imagine that Goolink could use that as much of an identifier. Any type of wireless encryption (WEP or WPA), while only providing incrementally more "security" would cause tons more complexity to 95% of the user base, and the other 5% could beat the security. I would think any kind of password/passphrase based system would be highly complicated and minimally effective (which is why i always guessed it would be wide open access). So, if it is wide open, and people realize that the MAC address is NOT a unique ID (because it can be easily spoofed and sniffed), it would seem that *AA would not allow the system! Whats to keep the Warez/open proxy/spamming/"evil" types from making incredible use of the anonimity? Finally, what keeps someone from filling their PC with Wireless cards (each with thier own mac address) to get 5 x the free WiFi (and making a nice, anonomous proxy)? Tim
  3. Hey, My suggestion is to try and find out a few more facts before jumping to conclusions. If you can "sniff the line" (a skill i dont' have - yet) and build a profile of what your actions cause ZA to do, you will know if it is dialing home or just "auto-updating" or whatever. A few other things to try might be to use some the sysinternal tools (tcpmon, diskmon come to mind) to see what program/process is triggering the network activity. Perhaps look at an outbound firewall connected to your NIC, I know some Nforce boards have them. I hear Kerio personal FW is good, but i use ZA now, but that may change.... finally, just because a process is called "Zonealarm.exe" doesn't mean it is from ZA.... If i was going to write malware, i wouldn't call it malware.exe, but rather windowsupdate.exe or McAfee.exe or whatever. Keep us informed, i will probably look at my install tonight..
  4. The best win 32 tools are at sysintenals.com. They are not specifically for spyware removal, but if you are smart enough, they will allow you to find the most stubborn and hidden spyware. I also like them for tracking down rogue processes that "authorized" programs create - like updaters and processes that dial home. Specifically: TCPmonitor diskmon process explorer and on and on.... HiJack This is for stuff other than IE problems, but works well for them, too. Oh, and Run as User (and use Peer guardian/firewall) when surfing "dangerous" sites. peace
×
×
  • Create New...