WindowsXP SP2 RC2 Firewall

gizbug

Platinum Member
May 14, 2001
2,621
0
76
If I run a linksys firewall router, is there even a need to run/have enabled the winxp sp2 firewall?
 

AkumaBao

Golden Member
Aug 14, 2001
1,438
0
0
Well if someone finds a exploit for your router firewall before you do, there would definatly be a reason. Personally I find there to be a reason to put a firewall in front of everything, even if you have one at the gateway.
 

dawks

Diamond Member
Oct 9, 1999
5,071
2
81
Originally posted by: gizbug
If I run a linksys firewall router, is there even a need to run/have enabled the winxp sp2 firewall?


The linksys router should be good enough. Unless you store very sensitive information on your system AND you have told people that its there.

The effort to get through the hardware firewall usually isnt worth it unless you have something they want, and they know its there.
 

WobbleWobble

Diamond Member
Jun 29, 2001
4,867
1
0
It's generally not needed. You'll most likely be safe from almost all worms unless one gets released that targets your particular router which is highly unlikely. It doesn't hurt to keep it on but it may cause some problems with some network applications that require port forwarding.

I personally leave mine off.
 

Megatomic

Lifer
Nov 9, 2000
20,128
6
81
I don't run a software firewall. The router is enough security for my small network.
 

stash

Diamond Member
Jun 22, 2000
5,468
0
0
There are reasons to run a firewall on the client in addition to a firewall that is in front of the network, but probably not for most home networks.

But consider if a friend brings a laptop to your house that is infected with Sasser or one of its variants. Your hardware firewall is not going to protect against that. Sasser is not the best example, since the Sasser vulnerability is not in SP2, but something else may come along that does the same thing.
 

oldman420

Platinum Member
May 22, 2004
2,179
0
0
Originally posted by: STaSh
There are reasons to run a firewall on the client in addition to a firewall that is in front of the network, but probably not for most home networks.

But consider if a friend brings a laptop to your house that is infected with Sasser or one of its variants. Your hardware firewall is not going to protect against that. Sasser is not the best example, since the Sasser vulnerability is not in SP2, but something else may come along that does the same thing.


i agree its like a shainghai brothel on the internet keep safe or you could catch something.
and as stash poinnted out attacks can come from within as well as without
 

VirtualLarry

No Lifer
Aug 25, 2001
56,453
10,120
126
Originally posted by: STaSh
There are reasons to run a firewall on the client in addition to a firewall that is in front of the network, but probably not for most home networks.

But consider if a friend brings a laptop to your house that is infected with Sasser or one of its variants. Your hardware firewall is not going to protect against that. Sasser is not the best example, since the Sasser vulnerability is not in SP2, but something else may come along that does the same thing.

Agreed. Everyone in this thread that said that you don't need a software firewall, if you are behind a NAT router device, is foolish. Good security comes in layers. Trusting your entire defense to only a single layer, is a surefire guide to failure when a "hole" appears in your single layer of defense.

I've seen this firsthand, actually, because it happened to me.

I generally run a software firewall, because well, it's just a good idea to always protect yourself (and by extension, your machine).

However, I had recently re-installed my fairly-new AMD XP2000 rig, and had taken it to a friend's house for a LAN party. Once there, I didn't bother to re-install the firewall either, because the local LAN was behind a LinkSys NAT router (connected to cable internet), and I thought that I would "be safe".

Well, partway through that weekend, I saw something that scared me quite a bit. I woke up and found a "messenger spam" pop-up on my screen, and I also found mIRC installed on my machine, but strangely, not listed in the add/remove programs. Initially, I thought that perhaps someone had installed it on my machine to use IRC while I was asleep (no password on the machine, everyone at the LAN party were personal friends). But after asking everyone, no-one mentioned installing, or even using, my machine. (There were enough machines for everyone to use, most people had their own anyways, so it wasn't necessary for anyone to use mine, although I wouldn't have minded.)

So *something* strange had happened. Knew that since I had recieved "messenger spam", that my machine was somehow exposed to the internet, unprotected, and given that and the few other strange things that had happened, I decided to re-format and re-install again, since I had just recently re-installed anyways, I wouldn't lose anything.

After some analysis of the situation, I discovered a few things - because I was not running a software firewall, my machine was r00ted by some worm, that basically allows remote-control via an install of mIRC.

The reason that my machine was even exposed "raw" to the internet in the first place was, my friend's router was mis-configured - he had his machine as the DMZ, except that the same IP was also in the range of IPs that the DHCP server would hand out. Somehow his machine got turned off, and mine got re-assigned the same IP as the DMZ - so my machine was fully-exposed due to misconfiguration.

Also, it seems as though the other machines on the local LAN also got infected, either by the same worm that hit my machine (likely), or something else, as I think that the LAN was still set up during the following week, with the misconfigured router. (I took my machine home after that weekend.)

So the moral of the story is, if you don't want your box to get r00ted, run a local firewall, no matter what. Do not depend on others for your personal (machine's) security.

(Technically, what happened is termed a "cascade failure". Implementing multiple layers of security, can stop those sorts of failures and isolate them at one level, instead of cascading through several layers and causing more problems. It is possible that, had I been running a software firewall at the time, my machine would have remained un-breached, as well as the remaining machines on the LAN might not have been infected either.)
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |