For every question, there's an answer -- and you'll find it here!


Printer-friendly copy
Top The PC Q&A Forum The Computer Forum topic #9039
View in linear mode

Subject: "ZoneAlarm Security? ..." Previous topic | Next topic
ScotterpopsSun Dec-30-01 12:14 PM
Charter member
4489 posts
Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
"ZoneAlarm Security? ..."


          

For some time now, I've wondered about ZoneAlarm's protection.   Don't get me wrong, I appreciate the superb quality of this product, it's just that I have observed that many people trust it unquestionably.   That's just the sort of thing that gets me asking questions.

I don't pretend to be knowledgeable about these matters, but I do know enough to use commonly available resources to help answer some of my own questions about a security product.   I've known for some time know that ZoneAlarm, all versions, is vulnerable to Mutex hi-jacking.   That doesn't bother me; there is a patch available (not from ZoneAlarm, mind you, but it works), and besides, I've never heard of this "weakness" actually being exploited.

Recently however, after having downloaded the most recent version of LeakTest, version 1.1, from Steve Gibson's site, I found my Win2K installation wide open when I ran the test.   I was dumbfounded.   I thought it was a fluke, so I ran LeakTest again.   ZoneAlarm had always blocked LeakTest completely in the past.   Why would ZA suddenly spring a "Leak"?   ZoneAlarm, the latest version, was on and running, its icon flashing away comfortingly in the System Tray.   Yet, no matter how many times I ran LeakTest, it failed.

As it turned out, it was a fluke.   I have no explanation for why ZA failed the test during that one session.   Presumably, something didn't load correctly during boot-up.   When I rebooted, and every time I've tested it since, ZoneAlarm passed the LeakTest with flying colors.   But I swear to you, that one time it failed, it did!   That's why I now run two firewalls (TPF in addition to ZA).   It's my choice, and that's why I've chosen to do so.

Then, here tonight I came across something that further piqued my interest in ZoneAlarm.   Seems that a poster called Magnus "
decided to try and write a little application to bypass ZoneAlarm. You know the little yellow popup window that asks you to confirm when a new application wants to access the Internet? What would happen if a malicious program clicked the "Yes" button in code?"   Turns out Magnus did a stellar job.   You can read Magnus's post here and download his utility to its own directory and then run it.   How does your ZoneAlarm respond?

One of my ZA installations passed, the other failed.   I haven't tested all my installations yet, but my guess is that the same will hold true.   Some will pass and some will fail.

I thought this might be of interest.


;~* ... Scotterpops





;~* ... Scott Gilmore

  

Alert Printer-friendly copy | | Top

Replies to this topic
Subject Author Message Date ID
RE: ZoneAlarm Security? ...
Dec 30th 2001
1
RE: ZoneAlarm Security? ...
Dec 30th 2001
2
RE: ZoneAlarm Security? ...
Dec 30th 2001
3
RE: ZoneAlarm Security? ...
Dec 30th 2001
7
RE: ZoneAlarm Security? ...
Dec 30th 2001
4
RE: ZoneAlarm Security? ...
Dec 30th 2001
5
RE: ZoneAlarm Security? ...
Dec 30th 2001
6
      RE: ZoneAlarm Security? ...
Dec 30th 2001
8
           RE: ZoneAlarm Security? ...
Dec 30th 2001
9
                RE: ZoneAlarm Security? ...
Dec 30th 2001
10
                RE: ZoneAlarm Security? ...
Dec 30th 2001
11
                     RE: ZoneAlarm Security? ...
Dec 30th 2001
12
                          RE: ZoneAlarm Security? ...
Dec 31st 2001
13
                               RE: ZoneAlarm Security? ...
Dec 31st 2001
14
                               RE: ZoneAlarm Security? ...
Dec 31st 2001
16
                                    RE: ZoneAlarm Security? ...
Dec 31st 2001
17
                                         RE: ZoneAlarm Security? ...
Dec 31st 2001
19
                                              RE: ZoneAlarm Security? ...
Dec 31st 2001
20
                               RE: ZoneAlarm Security? ...
Dec 31st 2001
21
                                    RE: ZoneAlarm Security? ...
Dec 31st 2001
22
                                         RE: ZoneAlarm Security? ...
Dec 31st 2001
23
                                              RE: ZoneAlarm Security? ...
Dec 31st 2001
24
                                              RE: ZoneAlarm Security? ...
Dec 31st 2001
27
                                              RE: ZoneAlarm Security? ...
Dec 31st 2001
25
                                                   RE: ZoneAlarm Security? ...
Dec 31st 2001
26
                                                        RE: ZoneAlarm Security? ...
Dec 31st 2001
28
                RE: ZoneAlarm Security? ...
Dec 31st 2001
15
                     RE: ZoneAlarm Security? ...
Dec 31st 2001
18

vitaltSun Dec-30-01 01:10 PM
Charter member
6896 posts
Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
#1. "RE: ZoneAlarm Security? ..."
In response to Scotterpops (Reply # 0)


  

          


Thanks for the info scotterpops...

seems its a never ending battle to stay above it all...first i find an infected computer than i hear ZA doesnt work and then i see another post that says none of my avs work...boy what a day..


Vitalt

Useful Team Info

  

Alert Printer-friendly copy | | Top

SonnySun Dec-30-01 01:42 PM
Charter member
12005 posts
Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
#2. "RE: ZoneAlarm Security? ..."
In response to Scotterpops (Reply # 0)


  

          


Scotter. You stated:

Presumably, something didn't load correctly during boot-up. When I rebooted, and every time I've tested it since, ZoneAlarm passed the LeakTest with flying colors.

A few days ago, I checked my event log and found a few errors for ZA initiated right after boot up. I rebooted and checked again and the errors failed to appear. So as a practice, I now check the Event log each time I boot (thankfully with XP it's not that often) and if I find an error, I will reboot. So far I've only seen this behavior twice and have not persued it other than to reboot. Maybe this will be cleared up with the release of version 3.0.






  

Alert Printer-friendly copy | | Top

TrebuchetSun Dec-30-01 06:11 PM
Charter member
1865 posts
Click to send email to this authorClick to view this author's profileClick to add this author to your buddy list
#3. "RE: ZoneAlarm Security? ..."
In response to Scotterpops (Reply # 0)


          

Just another reason to practice safe computing and not wholy rely on ANY software.

I may own a pistol for home defense, but I still lock my doors. Same principal applies here.

  

Alert Printer-friendly copy | | Top

    
brettSun Dec-30-01 09:51 PM
Charter member
561 posts
Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
#7. "RE: ZoneAlarm Security? ..."
In response to Trebuchet (Reply # 3)


          

>Just another reason to practice safe computing and not wholy
>rely on ANY software.
>
>I may own a pistol for home defense, but I still lock my
>doors. Same principal applies here.

Couldn't agree more!

The TooLeaky test shows that, if not backed up by safe practice, most security utilities are pretty much useless.

  

Alert Printer-friendly copy | | Top

TuffSun Dec-30-01 06:39 PM
Charter member
3875 posts
Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
#4. "RE: ZoneAlarm Security? ..."
In response to Scotterpops (Reply # 0)


          

I have tried to exploit the leaks, but the leak test passed every time with flying colors.I do think that ZA will take a look at some of the findings,and try to do something about the program to make it even more secure.Tuff









  

Alert Printer-friendly copy | | Top

brettSun Dec-30-01 09:43 PM
Charter member
561 posts
Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
#5. "RE: ZoneAlarm Security? ..."
In response to Scotterpops (Reply # 0)
Sun Dec-30-01 10:05 PM

          

An alternative leak test (which will also work with PF's other than ZAF/ZAP) can be found here:-

http://tooleaky.zensoft.com/tooleaky.exe

(I'd be interested to know if anyone's PF passes this test!)

  

Alert Printer-friendly copy | | Top

    
brettSun Dec-30-01 09:48 PM
Charter member
561 posts
Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
#6. "RE: ZoneAlarm Security? ..."
In response to brett (Reply # 5)


          

Oops ... I meant to post the URL for the site rather than just the download. Here it is:-

http://tooleaky.zensoft.com/

  

Alert Printer-friendly copy | | Top

        
ScotterpopsSun Dec-30-01 10:05 PM
Charter member
4489 posts
Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
#8. "RE: ZoneAlarm Security? ..."
In response to brett (Reply # 6)


          

Oh yeah, I remember this one now.   Thanks for the reminder.

TooLeaky works by creating a hidden IE window.   You can block TooLeaky by going to ZA's Programs tab and disallow Internet Explorer access to the Internet.   It is an interesting test and shows one of the variety of ways a firewall can be defeated though.   Of course, Internet Explorer is no more of a 'threat' in the hands of TooLeaky than it is under normal circumstances.


;~* ... Scotterpops





;~* ... Scott Gilmore

  

Alert Printer-friendly copy | | Top

            
brettSun Dec-30-01 10:17 PM
Charter member
561 posts
Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
#9. "RE: ZoneAlarm Security? ..."
In response to Scotterpops (Reply # 8)
Sun Dec-30-01 10:21 PM

          

>Of course, Internet Explorer is no more of a 'threat' in the hands of TooLeaky than it is under normal >circumstances.

Not quite right. Here's an extract from the information provided in TooLeaky's source code:-

This program will penetrate every firewall currently on the market that
claims to offer "outbound" protection, because it does not send or receive
data itself. Instead, it uses a hidden Internet Explorer window to do it.
And, of course, everybody allows Internet Explorer to send and receive data,
otherwise using the Internet would be a big pain in the you-know-what.

This program does two things:

(1) Transmits the string "PersonalInfoGoesHere" to Steve Gibson's web site.
(2) Retrieves a string back from Steve Gibson's web site, stored in the
<TITLE></TITLE> section of a web page.

For a programmer to use this method generically in their application, they
would simply need to replace the URL in this program with a URL from their
own site, change the outputString from "PersonalInfoGoesHere" to any
information they would like to transmit, and then set up their web server to
return the information they would like to retreive in the <TITLE></TITLE>
block of their page (the first few characters of the title are used as a
unique identifier so this program can find the window, since it doesn't
bother to keep track of the hidden IE window when it's first created). And of
course a programmer could repeat this process to transmit or receive as much
data as they'd like, or use the methods outlined in the code to send or
receive LARGE blocks of data in one fell swoop.

  

Alert Printer-friendly copy | | Top

                
ScotterpopsSun Dec-30-01 10:28 PM
Charter member
4489 posts
Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
#10. "RE: ZoneAlarm Security? ..."
In response to brett (Reply # 9)


          

What you've said is true, of course.   But this is the problem with some of this alarmist stuff; it's still just IE.   Secure your browser, as you should be doing regardless of TooLeaky's existence, and you've minimized your risks.   In the scenario you describe, the web page that a hacker might use would be in the Internet Zone.   If you disable ActiveX and Java in that zone (as well as Scripting), there's very little likelihood that anything can come of it.   It is unlikely that a hacker could use this exploit to say, upload or download files or run code, and the information they can get from your machine is no more than any web site can already gather by just surfing around.


;~* ... Scotterpops





;~* ... Scott Gilmore

  

Alert Printer-friendly copy | | Top

                    
brettSun Dec-30-01 10:59 PM
Charter member
561 posts
Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
#11. "RE: ZoneAlarm Security? ..."
In response to Scotterpops (Reply # 10)


          

Agreed. But, alas, not everybody realises the importance of such actions. One of my gripes about PF products is that they DO tend to lull people into a somewhat false sense of security. There was a thread a short while ago in which somebody asked whether there was a need for them to use a PF on their computer. The answer given was simply, "yes". IMHO, the answer should have been, "Yes, but first do X,Y and Z otherwise the firewall will be useless." TooLeaky maybe proves this point.

  

Alert Printer-friendly copy | | Top

                        
ScotterpopsSun Dec-30-01 11:20 PM
Charter member
4489 posts
Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
#12. "RE: ZoneAlarm Security? ..."
In response to brett (Reply # 11)


          

I agree 100%.   Your best anti-virus/Trojan/worm is ... you!


;~* ... Scotterpops





;~* ... Scott Gilmore

  

Alert Printer-friendly copy | | Top

                            
Bob GMon Dec-31-01 12:41 AM
Charter member
7115 posts
Click to send email to this authorClick to view this author's profileClick to add this author to your buddy list
#13. "RE: ZoneAlarm Security? ..."
In response to Scotterpops (Reply # 12)


  

          

I don't understand the techie stuff, but there's an aspect to Toolkey and the like that doesn't seem to get mentioned much. First you have to download it, then you have to run it - I mean, come on ...

  

Alert Printer-friendly copy | | Top

                                
SpeziMon Dec-31-01 01:28 AM
Charter member
5044 posts
Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy listClick to send message via ICQ
#14. "RE: ZoneAlarm Security? ..."
In response to Bob G (Reply # 13)


  

          

I agree. Those tests always require our help to prove we have inferior stuff. How convenient. Kind of like a thief asking me for my house keys and then telling me my door is open once I've handed him the keys to use.

  

Alert Printer-friendly copy | | Top

                                    
ScotterpopsMon Dec-31-01 01:47 AM
Charter member
4489 posts
Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
#16. "RE: ZoneAlarm Security? ..."
In response to Spezi (Reply # 14)


          

The idea behind these tools is to demonstrate that should you download something nefarious, or even if it's a 'legitimate' program, that there are ways around your firewall.   They are legitimate demonstrations of the possible weaknesses in personal firewalls.   If that were not a valid concern, why would you run ZoneAlarm in WinXP at all?   After all, the built-in firewall protects against incoming threats.


;~* ... Scotterpops





;~* ... Scott Gilmore

  

Alert Printer-friendly copy | | Top

                                        
Bob GMon Dec-31-01 02:17 AM
Charter member
7115 posts
Click to send email to this authorClick to view this author's profileClick to add this author to your buddy list
#17. "RE: ZoneAlarm Security? ..."
In response to Scotterpops (Reply # 16)


  

          

I think I disagree ... What they show is a weakness in Windows for allowing something to take over IE. I'd be curious if the same sort of thing would work with Linux.

  

Alert Printer-friendly copy | | Top

                                            
ScotterpopsMon Dec-31-01 03:04 AM
Charter member
4489 posts
Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
#19. "RE: ZoneAlarm Security? ..."
In response to Bob G (Reply # 17)


          

LeakTest has nothing to do with IE.   ZoneClickThrough, that prompted my post in the first place also has absolutely nothing to do with IE.   Did you check out any of the links I posted in the first post of this thread?   The Mutex hi-jacking issue has nothing to do with IE.   The only one of these various tools that used IE to circumvent personal firewall software was TooLeaky, mentioned by Brett.

According to advanced calculus, that's four completely different methods that software that you could potentially download (whether installed intentionally or not--see the Comet Cursors thread elsewhere in this forum) could use to circumvent your personal firewall.   Do you think the people who sit around dreaming up spyware schemes are going to refrain from using one of these techniques because it's, well...wrong to do so?   If we lowly unwashed know about these four methods, do you really think that these are the only ways around firewalls?

Nevertheless, my post was not meant to raise an alarm.   Rather, it was meant to offer the users of this computer forum some more information about what potentially could be some significantly important information about their computers and how they interact in the environment they've chosen to participate in (at least part of the time).   I see no reason to suddenly freak out about these facts, but I do definitely believe that the more knowledgeable the computing public becomes, the better off we'll all be.

As far as Linux is concerned, it is just as vulnerable to such tactics because the inherent weakness being discussd in this thread isn't the operating system, it's the user.


;~* ... Scotterpops





;~* ... Scott Gilmore

  

Alert Printer-friendly copy | | Top

                                                
Bob GMon Dec-31-01 04:06 AM
Charter member
7115 posts
Click to send email to this authorClick to view this author's profileClick to add this author to your buddy list
#20. "RE: ZoneAlarm Security? ..."
In response to Scotterpops (Reply # 19)


  

          

Yeah, I had Toolkey on my mind because that's the one that seems to raise alarms the most, and it was mentioned here (and it's not the firewall's fault if Windows allows your browser to be hijacked.) As to the others, failing leaktest is a fluke (makes you wonder though,) the click through thing failed on mine (because it's specific to ZA which I don't use?) so I forgot about it as just another silly bit of fluff, and the Mutex thing is over my head. As I understand it, it's a Windows exploit that targets ZA - so it's Windows' problem (since NT/2K is immune it has to be a Windows thing it seems to me.) There's an NT vulnerability as well where winsock can be shut down, but I don't know the relevance of that in this discussion, but again it's a Windows thing.

You're right about the user involvement though. But, what chance does the user have besides being utterly paranoid? My dental hygienist (been seeing her exclusively for about 10 years,) who has had a computer much longer than me, recently asked me about a "fire alarm" because someone told her she needed one. She also said something about having two worms, and how she needed to replace McAfee. I said something about keeping her AV updated, and she replied, "Updated?"

The fundamental point I think is that firewalls are just like everything else, a tool. They certainly don't make you immune, and it would be nice if their marketing reflected this a bit more. I also don't understand the popularity of ZA. It's no better than Outpost or Tiny, and I'd rather use either of those alternatives. Maybe it's like a Windows thing ... ZA gets targeted more because of its popularity.

  

Alert Printer-friendly copy | | Top

                                
brettMon Dec-31-01 05:11 AM
Charter member
561 posts
Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
#21. "RE: ZoneAlarm Security? ..."
In response to Bob G (Reply # 13)


          

>I don't understand the techie stuff, but there's an aspect
>to Toolkey and the like that doesn't seem to get mentioned
>much. First you have to download it, then you have to run it
>- I mean, come on ...

How do you think viruses spread?

  

Alert Printer-friendly copy | | Top

                                    
SpeziMon Dec-31-01 05:33 AM
Charter member
5044 posts
Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy listClick to send message via ICQ
#22. "RE: ZoneAlarm Security? ..."
In response to brett (Reply # 21)


  

          

Exactly the point. Those in the know are suspicious of anything that has to be downloaded and clicked on. Viruses are spread by incompetent users who click on anything willy nilly and who think an Anti Virus is a flu shot. }>

Like many other items that come to mind a computer is just another tool and is only as good as the operator. Using a tool efficiently requires practise and familiarization with its powers. That's why I began frequenting this forum. Sadly the same person who would not dream of starting up a brand new power saw because of the noise and potential danger, tends to not give a second thought to sitting down at a PC without reading a manual or software installation instructions when they want to install something etc. etc........

I find it quite frustrating how difficult it is to try and teach friends the importance of keeping Anti Virus definitions up to date. I mean how hard is it to check for updates daily? These then are the very same people who complain incessantly about the computers poor performance or odd behavior or call the Anti Virus program inefficient when all the while they did not do their part to protect themselves and have as a result become host to the latest virus, worm or whatever.

As others have said many times the best defence against viruses and other undesirables is US.

  

Alert Printer-friendly copy | | Top

                                        
ScotterpopsMon Dec-31-01 05:58 AM
Charter member
4489 posts
Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
#23. "RE: ZoneAlarm Security? ..."
In response to Spezi (Reply # 22)


          

Spezi, I am in complete agreement with what you've said, but that's only part of the equation.   What you're saying is that the user is ultimately responsible, and I agree with that assertion entirely.   However, what you and Bob haven't acknowledged is that occasionally, in spite of the best efforts of the most cautious and diligent user, situations can arise where something ends up on your computer that behaves in a manner unexpected--that you had valid reason not to expect even when you've been cautious.

I'll give you just one example.   For years I've used WS_FTPLE, a freeware FTP client, to upload my web page and my FTPing in general on a daily basis.   This is a simple and effective program and very reliable.   How many of you use it?   Did you know that about once every few months it acts as a server?   (Or, I should say, it tries to act like a server.)

Before I started using WS_FTPLE I checked it out.   It is on NO spyware lists anywhere that I could find then or since.   Presumably it's just checking for new versions, but I can't be sure about that, especially with a program that by its very nature exposes the entire contents of my hard drive.

For just such occasions, I want reliable and effective a firewall.   And now I'll take it a step further.   If users don't stay on top of this stuff, if we don't keep an eye on software makers in general, the next thing you know, programs that used to just rely on poor security in order to 'dial out' will begin to use more nefarious tactics.   Hell, I remember the Internet when there was no such things as cookies, much less web bugs and Comet Cursor type abominations.

Knowledge and caution are desirable endeavors on this area.   You seem to suggest that we ignore such tools as LeakTest and TooLeaky--that they aren't valid.   I respectfully disagree.


;~* ... Scotterpops





;~* ... Scott Gilmore

  

Alert Printer-friendly copy | | Top

                                            
Bob GMon Dec-31-01 06:13 AM
Charter member
7115 posts
Click to send email to this authorClick to view this author's profileClick to add this author to your buddy list
#24. "RE: ZoneAlarm Security? ..."
In response to Scotterpops (Reply # 23)


  

          

Shit, now I have to go re-do my ftp rules.

  

Alert Printer-friendly copy | | Top

                                                
ScotterpopsMon Dec-31-01 06:31 AM
Charter member
4489 posts
Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
#27. "RE: ZoneAlarm Security? ..."
In response to Bob G (Reply # 24)


          

ROFL


;~* ... Scotterpops





;~* ... Scott Gilmore

  

Alert Printer-friendly copy | | Top

                                            
SpeziMon Dec-31-01 06:16 AM
Charter member
5044 posts
Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy listClick to send message via ICQ
#25. "RE: ZoneAlarm Security? ..."
In response to Scotterpops (Reply # 23)


  

          

I'm not suggesting such tools be ignored however I am suggesting they be taken with a grain of salt. The one you posted did in fact make ZA pop up a box but also made ZA crash. The one about the mutex test happens to be one that I ran across many months back and I posted about it as I was concerned that ZA had been compromised and at the time Alex pretty much chided me for giving credence to a test that required my help. I am assuming nothing has changed since then? If it has I missed the post.

  

Alert Printer-friendly copy | | Top

                                                
ScotterpopsMon Dec-31-01 06:30 AM
Charter member
4489 posts
Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
#26. "RE: ZoneAlarm Security? ..."
In response to Spezi (Reply # 25)


          

>I'm not suggesting such tools be ignored however I am suggesting they be taken with a grain of salt.

Well then, we're basically saying the same thing two different ways.   These tests are at best interesting to study, but I do feel that ZoneAlarm (and other firewall makers) should strive to stay ahead of such 'holes'.


;~* ... Scotterpops





;~* ... Scott Gilmore

  

Alert Printer-friendly copy | | Top

                                                    
SpeziMon Dec-31-01 06:42 AM
Charter member
5044 posts
Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy listClick to send message via ICQ
#28. "RE: ZoneAlarm Security? ..."
In response to Scotterpops (Reply # 26)


  

          

Yes I copy that.

  

Alert Printer-friendly copy | | Top

                
luv2codeMon Dec-31-01 01:46 AM
Charter member
140 posts
Click to send email to this author Click to send private message to this authorClick to view this author's profileClick to add this author to your buddy list
#15. "RE: ZoneAlarm Security? ..."
In response to brett (Reply # 9)


          

> And, of course, everybody allows Internet Explorer to send
>and receive data,
> otherwise using the Internet would be a big pain in the
>you-know-what.

Funny you should mention this... IE is the only program for which I have permanently revoked internet access! A lot of my emails started generating pop-up windows -- which I find incredibly annoying and invasive -- and oddly enough, they were all in IE. But since I don't use IE, I got the pleasure of waiting through the program launch before I could manually reject the attempt at internet access. Granted, revoking access only removes the last step... but it made the whole process go remarkably faster.

As for the "necessity" of IE... if a site can't be viewed in Opera or Netscape, I don't need to go there. I can only think of two reasons to code a site IE-specific: laziness or snoopiness. (I usually try not to be so strongly worded about my opinions on here, but browser exclusiveness is one of my pet peeves!!) Anyhow, thanks for giving me another reason NOT to use IE! (as if I needed one LOL)



  

Alert Printer-friendly copy | | Top

                    
Bob GMon Dec-31-01 02:20 AM
Charter member
7115 posts
Click to send email to this authorClick to view this author's profileClick to add this author to your buddy list
#18. "RE: ZoneAlarm Security? ..."
In response to luv2code (Reply # 15)


  

          

I routinely block port 80 out for email, I'm guessing that would kill your popups, if you don't mind losing the ads.

  

Alert Printer-friendly copy | | Top

Top The PC Q&A Forum The Computer Forum topic #9039 Previous topic | Next topic
Powered by DCForum+ Version 1.27
Copyright 1997-2003 DCScripts.com
Home
Links
About PCQandA
Link To Us
Support PCQandA
Privacy Policy
In Memoriam
Acceptable Use Policy

Have a question or problem regarding this forum? Check here for the answer.