Pillager
League of Empire Loyalist
As I said in the other thread that seems to have worked its way on to this topic, I use Outpost, which seems to be pretty good. It's has all the usual firewall and ad blocking stuff, and seems to be working well.
Most people have absolutely no idea about what a decent programmer can do to your system. To use an analogy, people's computers are getting raped all the time, and that is not the bad part... the bad part is that most people are totally unaware that their computer is being brutally violated and get this... those that manage to rape your computer brag about it (e.g., sell or distribute the info to other computer rapists), and it becomes a party at your computer! The only thing that really "protects" a lot of people is that their machine is simply not worth much malicious trouble.... but should someone want to do anything to it, that "back door" is really a "front door" and a beacon for anyone who knows about such things to brutalize your machine some more.47 spyware cookies, and 2 backdoor exe programs on my computer!!!
Unbelievable!
The 2 backdoor exe's kind of bothered me, those are kind of serious.
I wonder who put them there???
Well, they are all gone now. I have the zone alarm up and running too.
I still see pop-ups on the forum though, it doesnt stop that.
But I'm protected from all that crap getting back into my registry and files.
Thanks for the hot tip Starlifter.
Technically, yes, a developer could leave little "back doors" in the code. But like you said, everyone and anyone can look at the source, including the end user, so any back doors are quickly spotted and patched out. There is no over-arching auditing or verification groups for linux. Each "flavor" or commercial release has its own company's coniguration management/quality assurance seal of approval, but again, anyone can look at any part of it.Originally posted by ainwood
On the linux front, being open-source, does this mean that there is the opportunity for some of the developers to put their own little back-doors in? I would assume not, because everyone else can look at the source, see it and flag it. Is there some sort of auditing / verification process that goes on?