-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 25 Oct 2005, at 12:40, Martin Kissner wrote:

> Trojans are usually run by the user

In that case I'm the only user on here. Having used Windows for the  
past 100 years or so I'm reasonably well gened up on what to and what  
not to run.

For years I ran Kerio firewall and that alerted me of any program  
trying to connect out, That's all I want and LS seems to fit the  
bill. I have a hardware firewall in my router and the apple firewall  
but neither allow full control over attempted outgoing connections.

I've also looked at NetBarrier but I'd already bought LS.

Am I right in thinking for LS to be compromised I, as the soul user  
of this Mac, have to specifically  give permission and run rogue  
software?


- -- 

Tony.
M2



-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.2 (Build 2425)
Comment: T.B.C. Imac G5 20"

iQA/AwUBQ14dkdanuJ+T+uXWEQJ9VQCeJ9bIuvaVfkwmmDuChkdgZfPny4cAoMLi
S6QF84YEnV+cw3yf0JHHlnI/
=WVGy
-----END PGP SIGNATURE-----
_______________________________________________
Littlesnitch-talk mailing list
Littlesnitch-talk@obdev.at
http://at.obdev.at/mailman/listinfo/littlesnitch-talk

Reply via email to