On Wed, Jan 22, 2014 at 10:14 AM, Christopher Schultz <
ch...@christopherschultz.net> wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> Konstantin,
>
> On 1/22/14, 9:03 AM, Konstantin Preißer wrote:
> > Hi Jeffrey,
> >
> >> -----Original Message----- From: Jeffrey Janner
> >> [mailto:jeffrey.jan...@polydyne.com] Sent: Tuesday, January 21,
> >> 2014 10:19 PM
> >
> >> Eureka, I finally figured it out! It was a real eureka moment,
> >> some remembrance burned its way up from my subconscious and I had
> >> the answer. Ready guys?  Really surprised no one mentioned it. It
> >> was Windows F-ing Firewall!!!!!
> >
> > Good to hear that you could find and solve the problem.
> >
> > (Off topic:)
> >
> >> I HATE WINDOWS!!!!!!
> >
> > What I can't quite understand is, how one can "hate" Windows or its
> > "F-ing" firewall, if they just do what they were configured to
> > do...     ;-)
> >
> > When setting up the Windows Firewall, I normally only create rules
> > for specific (TCP) ports, not for specific executables, so that the
> > firewall allows connections to a TCP port regardless of what the
> > name or path of the executable is.
>
> Actually, as surprising as it can sometimes be, I find that the
> Windows firewall is better than iptables *because* it /can/ do things
> like this. You can make your system a bit safer.
>
> For instance, if your server is compromised (yes, I know, once you're
> owned, you're owned) and the attacker installs some malware of some
> kind, that malware will not be able to bind to a port or even make
> outgoing connections, even on "standard" outgoing ports -- for
> instance HTTP.
>
> Lots of malware connects to external C&C servers to give instructions,
> and the Windows wirewall makes it easy to prevent that from happening
> even when ports like 80 are used -- and typically left wide-open on
> servers.
>
> - -chris
>

+1 chris, and for these reasons/features (and more), I LOVE WINDOWS (SERVER
2008)!!! :)

Reply via email to