Latest threads in Networking Firewallsshow only best voted threads

Subject Author Posted Replies
 
What's a good free firewall program for 64-bit W10?
Most importantly, it can prompt and block outgoing connections like programs that phone home. I used to use Conseal PC Firewall, Kerio Firewall, Outpost Firewall 2009, Norton (before 2015), and...
3
3
 
Bizarre behavior of a non-smart mobile phone
sim card cannot initiate a call.
4
4
 
Firewall Security Engineer-Manassas, VA-Contract to Hire#.#
Please contact me at JOB DETAILS: Job Title: Firewall Security Engineer Location: Manassas, VA Duration: 3 Month Contract to Hire Interview Method: Phone Job Summary: We are seeking a talented...
 
kerio pfw replacement:mission impossible
I've looked at half a dozen firewalls and researched forum discussions on this without success. So far I have yet to find a firewall that, like the best kerio pfw 2.1.nn accomplished the following:...
3
3
 
Looking for a customer of Ennetcom
Hi, erlin. I am looking for customers of Dutch company Ennetcom, the supplier of Black berrys with pre-installed PGP encryption, which was recently shut down by D utch police or anybody who can tell...
 
what is a firewall?!!
Entering computer term firewall at About 4,580,000 results (0.46 seconds) Google Advanced Search https://encrypted.google.com/advanced_searchreturns
1
1
 
My IP is being leaked by WebRTC. How do I disable it? (WebRTC STUN
In article <> Nomen Nescio <> wrote: We certainly can't trust google now.
2
2
 
Anyone Still Making High End Firewall Implemented as a Windows Application?
Earlier versions of Checkpoint Firewall-1 were implemented as an application running on Microsoft Windows. Microsoft also made a great firewall ISA Server that became the Forefront firewall, and then...
3
3
 
IPTABLES help
Could someone tell me what this line, that's been added to my router configuration at some stage, might be for: iptables -t nat -I POSTROUTING -o eth1 -j SNAT --to Thanks.
10
10
 
BITPERM, a simple encryption scheme (with authentication) based on bits,permutation and dynamic bytes substitution
The software is available at: M. K. Shen Code: Select all #[space]BITPERM,[space]a[space]simple[space]encryption[space]scheme[space](with[space]authentication)[space]based[space]on[space]bits
 
Simple feasibility of embedding a back door into a proprietary software for RSA key generation
I have just tried out an idea of maartin in another Usenet group many years ago of how one could introduce a back door into a proprietary software (or defacto similarly into a huge and poorly...
 
AES/Python, an implementation of AES in Python with examples of counter mode operations and encryption (with authentication) with PCBC (block-chaining)
The implementation of AES in this software follows the pseudo-code in FIPS-197 very closely and neglects all feasible optimization tricks so as to maximize the readability and hence ease of...
 
RANDOMPREFIX, an encryption scheme based on dynamic bytes substitution and pseudo-random prefix-coding
The software is available at: For constructive critiques and comments I should be very grateful. The binary result of encryption can e.g. be transported as an attachment file in a normal email system...
 
HOMOPHONE, a modern encryption scheme based on homophonic substitutions
M. K. Shen
 
Tech Mahindra/Chevron looking for :Sr.security analyst -L3 at San Ramon , CA
Hi Professional We are having a very urgent requirement analyst -L3 Can you please go through the below requirement and reply back with your up dated resume along with the contact details. Please let...