for a simple effective firewall thats actually fun to use, try hacktracer 2.2.5
for a fun backstop to the firewall use this popup stopper ems free surfer mk II, check the lock home page setting and everything in the washboard except typed urls
i'm on the net over 40 hours a week, have a collection of virii going back over 15 years, and have only recieved 1 unsolicited virus (as an email attachment) the thing to fear is trojan bots, try this little ap josh siok's trojan security.
recently tested ZAP and norton, together and separate, they confuse the user and each other, and are very uninformative, typical of norton,[xx(] the very first program i wrote on an ibm used dynamic keyboard because norton said in THE PETER NORTON PROGRAMMER'S GUIDE TO THE IBM PC (the pink shirt book) and I quote "41E...The keyboard buffer...It is not wise to mess with any of this data." he likes to keep secrets.[V] i wrote a two line basic program to analyze the buffers behavior (it took five minutes 'cause i had never touched an ibm b4)[^] and 10 minutes to write the proggy. not a "virus", though it coulda bin.[}:)] was a self contained extensible database.(under 1k) the only norton product i use is an OLD non-networked commander (no cd capability even with dos drivers loaded)[V] I refuse to reverse engineer. and am too busy to engineer a workaround. anybody got any ideas on how to make it work with cds?[?] i use it for installs right now but it would be slick to be able to udf thru it to cd...[:p]
oh yeah, disable file and printer shareing and only use the tcp protocol. (hic)[:o)] email@example.com
beer: its good for what ales ya