推介:| Video Conferencing | Online Shop Software | 防毒軟件 | 企業資源規劃(ERP) | 軟件公司 | Database | 軟件開發 | 教育軟件 | 圖像軟件 | 中文輸入法 | 作業系統 |

發新話題
打印

[建議] Free firewalls rated best in leak tests

Free firewalls rated best in leak tests

http://www.virusbtn.com/news/virus_news/2006/12_07a.xml

Free firewalls rated best in leak tests

Leakage review puts Comodo, Jetico way ahead of field.

An in-depth study subjecting 23 different personal firewall products to a range of leak tests has granted two free products, Comodo Personal Firewall and Jetico Personal Firewall, the only 'excellent' ratings in the field. Behind them are the popular ZoneAlarm PRO and Trend Micro's PC-cillin Internet Security, both rated 'very good'.

Kaspersky and Lavasoft products are in the 'good' category, as is Outpost, despite being accused of cheating. Meanwhile Sunbelt and Norton are in the 'poor' group and McAfee alongside Sygate under 'very poor'. The level of protection offered by products from CA, BitDefender, F-Secure, Panda and AVG, among others, is described as 'none'. At the bottom of the class, with a score of zero, is of course the Windows XP SP2 built-in firewall, which only protects against inbound attacks.

The tests were designed and carried out by a small group of researchers led by David Matousek and published at matousec.com. Their methodologies have come in for some criticism, particularly concerning treatment of integrated products combining firewalls with anti-malware; many such products picked up on the suspicious behaviour of the leak tests themselves, and had to have their anti-malware modules disabled to complete the testing. Some vendors have suggested that this impairs performance, as their firewalls are intended to work in conjunction with malware blocking without unnecessary overlapping.

Results of the tests were released last week, and responses from several vendors have begun to be posted on the results site. These can be viewed, along with detailed results, a description of the testing methodology and many of the test programs used, here. Further firewall testing is planned.

Elsewhere in the firewall world, heise security reports that a bug in the Convert-UUlib Perl library, discovered in April 2005, was left unpatched in its implementation in the Barracuda firewall until a very recent update. The vulnerability left Barracuda users at risk of remote access attacks for the full 20 months. heise's report is here, and details from the researcher who found the hole are here.

07 December 2006

TOP

發新話題


重要聲明:本討論區是以即時上載留言的方式運作,本網站對所有留言的真實性、完整性及立場等,不負任何法律責任。而一切留言之言論只代表留言者個人意見,並非本網站之立場,用戶不應信賴內容,並應自行判斷內容之真實性。於有關情形下,用戶應尋求專業意見(如涉及醫療、法律或投資等問題)。由於本討論區受到「即時上載留言」運作方式所規限,故不能完全監察所有留言,若讀者發現有留言出現問題,請聯絡我們。本討論區有權刪除任何留言及拒絕任何人士上載留言,同時亦有不刪除留言的權利。切勿撰寫粗言穢語、誹謗、渲染色情暴力或人身攻擊的言論,敬請自律。本網站保留一切法律權利。


Copyright 1997- Xocat. All Right Reserved.