Firewall
-
- Site Moderator
- Posts: 27330
- Joined: 22. Oct 2010, 11:03
- Primary OS: Mac OS X other
- VBox Version: PUEL
- Guest OSses: Win(*>98), Linux*, OSX>10.5
- Location: Greece
Re: Firewall
It depends.
Do NOT send me Personal Messages (PMs) for troubleshooting, they are simply deleted.
Do NOT reply with the "QUOTE" button, please use the "POST REPLY", at the bottom of the form.
If you obfuscate any information requested, I will obfuscate my response. These are virtual UUIDs, not real ones.
Do NOT reply with the "QUOTE" button, please use the "POST REPLY", at the bottom of the form.
If you obfuscate any information requested, I will obfuscate my response. These are virtual UUIDs, not real ones.
-
- Posts: 100
- Joined: 11. Jan 2017, 17:33
- Primary OS: MS Windows 10
- VBox Version: OSE other
- Guest OSses: MS Windows XP, Linux Mint
- Location: Stockholm
Re: Firewall
Well, in my case the host system is windows 10 home and the guest system is windows xp sp3 or rather "sp4" including all recent POSReady updates.
-
- Site Moderator
- Posts: 27330
- Joined: 22. Oct 2010, 11:03
- Primary OS: Mac OS X other
- VBox Version: PUEL
- Guest OSses: Win(*>98), Linux*, OSX>10.5
- Location: Greece
Re: Firewall
From Wikipedia on Firewall_(computing):
Your typical scenario from these attacks is: you go to a website. You download something. You're owned. A firewall will not protect you.
The outgoing traffic, you don't really care about. What incoming traffic do you anticipate that could attack your guest?Wikipedia on [url=https://en.wikipedia.org/wiki/Firewall_(computing)]Firewall_(computing)[/url] wrote:In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.
- If you use Bridged and you're behind your router (usually a firewall as well), you'd have to specifically direct that incoming traffic to a specific port in your guest. Your host's firewall isn't even involved.
- If you use NAT, you'd have to specifically direct that incoming traffic to a specific port in your guest by using the NAT forwarding rules. You would be manually bypassing the host's firewall, so you would know about it.
Your typical scenario from these attacks is: you go to a website. You download something. You're owned. A firewall will not protect you.
Do NOT send me Personal Messages (PMs) for troubleshooting, they are simply deleted.
Do NOT reply with the "QUOTE" button, please use the "POST REPLY", at the bottom of the form.
If you obfuscate any information requested, I will obfuscate my response. These are virtual UUIDs, not real ones.
Do NOT reply with the "QUOTE" button, please use the "POST REPLY", at the bottom of the form.
If you obfuscate any information requested, I will obfuscate my response. These are virtual UUIDs, not real ones.