-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
On 25 Oct 2005, at 12:40, Martin Kissner wrote: > Trojans are usually run by the user In that case I'm the only user on here. Having used Windows for the past 100 years or so I'm reasonably well gened up on what to and what not to run. For years I ran Kerio firewall and that alerted me of any program trying to connect out, That's all I want and LS seems to fit the bill. I have a hardware firewall in my router and the apple firewall but neither allow full control over attempted outgoing connections. I've also looked at NetBarrier but I'd already bought LS. Am I right in thinking for LS to be compromised I, as the soul user of this Mac, have to specifically give permission and run rogue software? - -- Tony. M2 -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.0.2 (Build 2425) Comment: T.B.C. Imac G5 20" iQA/AwUBQ14dkdanuJ+T+uXWEQJ9VQCeJ9bIuvaVfkwmmDuChkdgZfPny4cAoMLi S6QF84YEnV+cw3yf0JHHlnI/ =WVGy -----END PGP SIGNATURE----- _______________________________________________ Littlesnitch-talk mailing list Littlesnitch-talk@obdev.at http://at.obdev.at/mailman/listinfo/littlesnitch-talk