
On 4/30/2013 11:22 AM, Anton Aylward wrote:
No, I'm not talking about servers, I mean things like web browsers and email clients. It doesn't even have to be drive0bys or getting the user to click on the url of a html-mail message. To do nifty things people download extensions and plugins. They don't even have to be trojans. Recall the bugs in adobe reader that would let a specially crafted document exploit the vulnerability? Well now firefox has its own built in pdf reader :-) Wanna bet that is "bug free"?
The problems you mention won't be fixed by a firewall. Virtually all malware these days use outbound connections, and unless you do mercenary egress filtering (not piratical in the real world) your firewall will happily allow outbound connections from just about anything on just about any port to just about any target IP. I egress filter a few common ports at the firewall (smtp and a couple others), against the possibility that some visitor to my network will have a spambot on their horribly compromised windows machine. But my laptop I take everywhere, and I know exactly what ports are open and really never bother with a firewall. (I'm more than a little concerned that dropbox is always listening, and I'm, thinking of dumping it for that reason). -- _____________________________________ ---This space for rent--- -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org