Comment Re:misleading headline (Score 5, Insightful) 303
Talk about stating the obvious...this is the most useless article I have read in a long time.
1) Web browser and javascript bugs - nothing to do with hardware or software firewalls.
2) email issues, people going to bad sites etc. - nothing to do with hardware or software firewalls.
3) People should not run as administrator (or root) - wow, really.
4) People should stay up-to-date on patches - wow, totally amazingly obvious.
As you can't control people, they will always do these things. Good software firewalls show-up issues after they have made these mistakes, when rogue software tries to get out.
They also failed (or I missed it) to mention that software firewalls are good when you have multiple computers behind a hardware firewall - basically and infected computer will be blocked infecting other computers e.g. netbios etc.
Good computer security is a layered concept. From incoming hardware firewalls, IDS, software firewalls on individual computers, user training, security audits etc. I wish people and organizations writing articles would finally learn this. There is no 'magic' one solution.
1) Web browser and javascript bugs - nothing to do with hardware or software firewalls.
2) email issues, people going to bad sites etc. - nothing to do with hardware or software firewalls.
3) People should not run as administrator (or root) - wow, really.
4) People should stay up-to-date on patches - wow, totally amazingly obvious.
As you can't control people, they will always do these things. Good software firewalls show-up issues after they have made these mistakes, when rogue software tries to get out.
They also failed (or I missed it) to mention that software firewalls are good when you have multiple computers behind a hardware firewall - basically and infected computer will be blocked infecting other computers e.g. netbios etc.
Good computer security is a layered concept. From incoming hardware firewalls, IDS, software firewalls on individual computers, user training, security audits etc. I wish people and organizations writing articles would finally learn this. There is no 'magic' one solution.