Latest threads in Networking Firewallsshow only best voted threads

Subject Author Posted Replies
 
What's a good free firewall program for 64-bit W10?
Most importantly, it can prompt and block outgoing connections like programs that phone home. I used to use Conseal PC Firewall, Kerio Firewall, Outpost Firewall 2009, Norton (before 2015), and...
3
3
 
Bizarre behavior of a non-smart mobile phone
sim card cannot initiate a call.
4
4
 
Firewall Security Engineer-Manassas, VA-Contract to Hire#.#
Please contact me at JOB DETAILS: Job Title: Firewall Security Engineer Location: Manassas, VA Duration: 3 Month Contract to Hire Interview Method: Phone Job Summary: We are seeking a talented...
 
kerio pfw replacement:mission impossible
I've looked at half a dozen firewalls and researched forum discussions on this without success. So far I have yet to find a firewall that, like the best kerio pfw 2.1.nn accomplished the following:...
3
3
 
Looking for a customer of Ennetcom
Hi, erlin. I am looking for customers of Dutch company Ennetcom, the supplier of Black berrys with pre-installed PGP encryption, which was recently shut down by D utch police or anybody who can tell...
 
what is a firewall?!!
Entering computer term firewall at About 4,580,000 results (0.46 seconds) Google Advanced Search https://encrypted.google.com/advanced_searchreturns
1
1
 
My IP is being leaked by WebRTC. How do I disable it? (WebRTC STUN
In article <> Nomen Nescio <> wrote: We certainly can't trust google now.
2
2
 
Anyone Still Making High End Firewall Implemented as a Windows Application?
Earlier versions of Checkpoint Firewall-1 were implemented as an application running on Microsoft Windows. Microsoft also made a great firewall ISA Server that became the Forefront firewall, and then...
3
3
 
IPTABLES help
Could someone tell me what this line, that's been added to my router configuration at some stage, might be for: iptables -t nat -I POSTROUTING -o eth1 -j SNAT --to Thanks.
10
10
 
AES/Python, an implementation of AES in Python with examples of counter mode operations and encryption (with authentication) with PCBC (block-chaining)
The implementation of AES in this software follows the pseudo-code in FIPS-197 very closely and neglects all feasible optimization tricks so as to maximize the readability and hence ease of...
 
Application Firewalls That Inspect Protocols?
It has been a long time since I have needed a new firewall, and I would like some pointers on developing a short list for the following requirements: * Firewall should not only support rule-based...
2
2
 
m0n0wall Project Ends
Probably anyone who cares about BSD has heard this news already: It's possible someone will pick it up or fork it; hope so as there isn't anything else quite like it - most of the alternatives...
1
1
 
Follow-up (minor) on pfSense Firewall
Just a little insight for any others that may have also looked at the pfSense firewall software: 1. I'm not versed in the latest incantations of Linux or any other Unix derivatives. It's been over 40...
 
PROVABLEPRIME Version 1.1.1 released
PROVABLEPRIME Version 1.1.1 has been released. It is a minor new version, containing modifications of code lines of Example 3 such that it can encrypt either a plaintext string or a byte sequence. M....
1
1
 
A Python implementation of encryption with prefix codes
PREFIXCODING, Version 2.0, available at: is an encryption scheme (with authentication) with pseudo-random prefix codes substitution and pseudo-random transposition. It has two kinds of processing...
1
1