|
Spezi, I am in complete agreement with what you've said, but that's only part of the equation. What you're saying is that the user is ultimately responsible, and I agree with that assertion entirely. However, what you and Bob haven't acknowledged is that occasionally, in spite of the best efforts of the most cautious and diligent user, situations can arise where something ends up on your computer that behaves in a manner unexpected--that you had valid reason not to expect even when you've been cautious.
I'll give you just one example. For years I've used WS_FTPLE, a freeware FTP client, to upload my web page and my FTPing in general on a daily basis. This is a simple and effective program and very reliable. How many of you use it? Did you know that about once every few months it acts as a server? (Or, I should say, it tries to act like a server.)
Before I started using WS_FTPLE I checked it out. It is on NO spyware lists anywhere that I could find then or since. Presumably it's just checking for new versions, but I can't be sure about that, especially with a program that by its very nature exposes the entire contents of my hard drive.
For just such occasions, I want reliable and effective a firewall. And now I'll take it a step further. If users don't stay on top of this stuff, if we don't keep an eye on software makers in general, the next thing you know, programs that used to just rely on poor security in order to 'dial out' will begin to use more nefarious tactics. Hell, I remember the Internet when there was no such things as cookies, much less web bugs and Comet Cursor type abominations.
Knowledge and caution are desirable endeavors on this area. You seem to suggest that we ignore such tools as LeakTest and TooLeaky--that they aren't valid. I respectfully disagree.
;~* ... Scotterpops
;~* ... Scott Gilmore
|