Over 1 million tech questions and answers.

Check Point VPN-1 and FireWall-1 Version 4.1 Vulnerability: July 9

Q: Check Point VPN-1 and FireWall-1 Version 4.1 Vulnerability: July 9


A vulnerability in Check Point FireWall-1 and VPN-1 may allow an intruder to pass traffic through the firewall on port 259/UDP.




Read other answers
Preferred Solution: Check Point VPN-1 and FireWall-1 Version 4.1 Vulnerability: July 9

I recommend downloading and running Reimage. It's a computer repair tool that has been proven to identify and fix many Windows problems with a high level of success.

I've used it in the past to identify and fix everything from blue screens (BSOD's), ActiveX errors, corrupt files and processes, dll/exe/sys errors, recover lost memory, Windows update problems, defragging, malware removal etc.

You can download it direct from this link http://downloadreimage.com/download.php. (This link will automatically start a download of Reimage that you can save to your computer.)


BLOG.CHECKPOINT.COM - WhatsApp ?MaliciousCard? Vulnerabilities Allowed Attackers to Compromise Hundreds of Millions of WhatsApp Users | Check Point Blog

Check Point security researcher Kasif Dekel recently discovered significant vulnerabilities which exploit the WhatsApp Web logic and allow attackers to trick victims into executing arbitrary code on their machines in a new and sophisticated way.

All an attacker needed to do to exploit the vulnerability was to send a user a seemingly innocent vCard containing malicious code. Once opened, the alleged contact is revealed to be an executable file, further compromising computers by distributing bots, ransomware, RATs, and other malwares.

To target an individual, all an attacker needs is the phone number associated with the account.

WhatsApp verified and acknowledged the security issue and have deployed the fix in web clients world-wide. To make sure you are protected, update your WhatsApp Web right now.

Check Point shared its discovery to WhatsApp on August 21, 2015. On August 27, WhatsApp rolled out the initial fix (in all versions greater than 0.1.4481) and blocked that particular feature.


Disclosure Timeline

August 21, 2015 ? Vulnerability disclosed to the WhatsApp security team.
August 23, 2015 ? First response received.
August 27, 2015 ? WhatsApp rolls out fixed web clients (v0.1.4481)
September 8, 2015 ? Public disclosure

?Thankfully, WhatsApp responded quickl... Read more

Read other answers


PHP is a popular scripting language in widespread use. For more information about PHP, see


The vulnerability occurs in the portion of PHP code responsible for handling file uploads, specifically multipart/form-data. By sending a specially crafted POST request to the web server, an attacker can corrupt the internal data structures used by PHP. Specifically, an intruder can cause an improperly initialized memory structure to be freed. In most cases, an intruder can use this flaw to crash PHP or the web server. Under some circumstances, an intruder may be able to take advantage of this flaw to execute arbitrary code with the privileges of the web server.

You may be aware that freeing memory at inappropriate times in some implementations of malloc and free does not usually result in the execution of arbitrary code. However, because PHP utilizes its own memory management system, the implementation of malloc and free is irrelevant to this problem.

Stefan Esser of e-matters GmbH has indicated that intruders cannot execute code on x86 systems. However, we encourage system administrators to apply patches on x86 systems as well to guard against denial-of-service attacks and as-yet-unknown attack techniques that may permit the execution of code on x86 architectures.

This vulnerability was discovered by e-matters GmbH and is described in detail in their advisory. The PHP Group has also issued an advisory. A list of vendors con... Read more

Read other answers


I have a Check Point 500 firewall. And I am getting slow download speeds. Now this piece of hardware is 10 years old, but should it be getting on average 4.2 Mbps download ( avg over 6 speedtest.net sessions to San Jose servers)

Also when I do a speedtest.net test, I can get download speeds of 9/10 Mbps if I connect to Palo Alto. But if I choose San Jose, I get the avg download of 4.2 Mbps. Can someone explain why?

So the Check Point 500 seems to be Capable of running faster. But most times when I download big files, like a Linux ISO, I have to wait 1 hr+.

So I bought a new router, and when I do a speedtest.net test with it, I get 27 Mbps to San Jose. And Linux ISO downloads wait times are around 4 to 7 minutes.

Should I throw away the Check Point?

Read other answers


SQL Server 2000 introduces the ability to host multiple instances of
SQL Server on a single physical machine. Each instance operates for
all intents and purposes as though it was a separate server. However,
the multiple instances cannot all use the standard SQL Server session
port (TCP 1433). While the default instance listens on TCP port 1433,
named instances listen on any port assigned to them. The SQL Server
Resolution Service, which operates on UDP port 1434, provides a way
for clients to query for the appropriate network endpoints to use for
a particular SQL Server instance.

There are three security vulnerabilities here. The first two are
buffer overruns. By sending a carefully crafted packet to the
Resolution Service, an attacker could cause portions of system memory
(the heap in one case, the stack in the other) to be overwritten.
Overwriting it with random data would likely result in the failure of
the SQL Server service; overwriting it with carefully selected data
could allow the attacker to run code in the security context of the
SQL Server service.

The third vulnerability is a denial of service vulnerability. SQL
uses a keep-alive mechanism to distinguish between active and passive
instances. It is possible to create a keep-alive packet that, when
sent to the Resolution Service, will cause SQL Server 2000 to respond
with the same information. An attacker who created such a packet,
spoofed the source address so that it appeared to come from a one SQL
Serve... Read more

Read other answers


When installing SQL Server 7.0 (including MSDE 1.0), SQL Server 2000,
or a service pack for SQL Server 7.0 or SQL Server 2000, the
information provided for the install process is collected and stored
in a setup file called setup.iss. The setup.iss file can then be
used to automate the installation of additional SQL Server systems.
SQL Server 2000 also includes the ability to record an unattended
install to the setup.iss file without having to actually perform an
installation. The administrator setting up the SQL Server can supply
a password to the installation routine under the following

- If the SQL Server is being set up in "Mixed Mode", a password
for the SQL Server administrator (the "sa" account) must be
- Whether in Mixed Mode or Windows Authentication Mode, a User ID
and password can optionally be supplied for the purpose of
starting up SQL Server service accounts.

In either case, the password would be stored in the setup.iss file.
Prior to SQL Server 7.0 Service Pack 4, the passwords were stored in
clear text. For SQL Server 7.0 Service Pack 4 and SQL Server 2000
Service Packs 1 and 2, the passwords are encrypted and then stored.
Additionally, a log file is created during the installation process
that shows the results of the installation. The log file would also
include any passwords that had been stored in the setup.iss file.

Maximum Severity Rating: Moderate

Affected Software:

Microsoft ... Read more

Read other answers


This patch eliminates two newly discovered vulnerabilities affecting
SQL Server 2000 and MSDE 2000:

- A buffer overrun vulnerability that occurs in several Database
Consistency Checkers (DBCCs) that ship as part of SQL Server 2000.
DBCCs are command console utilities that allow maintenance and
other operations to be performed on a SQL Server. While many of
these are executable only by sysadmin, some are executable by
members of the db_owner and db_ddladmin roles as well. In the most
serious case, exploiting this vulnerability would enable an
attacker to run code in the context of the SQL Server service,
thereby giving the attacker complete control over all databases
on the server.

- A SQL injection vulnerability that occurs in two stored
procedures used in database replication. One of these can only be
run by users who have been assigned the db_owner role; the other,
due to a permissions error, could be run by any user who could log
onto the server interactively. Exploiting the vulnerability could
enable an attacker to run operating system commands on the server,
but is subject to significant mitigating factors as discussed

Maximum Severity Rating: Moderate

Affected Software:

Microsoft SQL Server 2000.
Microsoft Desktop Engine (MSDE) 2000
Download locations for this patch
SQL Server 2000:


http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulleti... Read more

Read other answers


The Internet Mail Connector (IMC) enables Microsoft Exchange Server
to communicate with other mail servers via SMTP. When the IMC
receives an SMTP extended Hello (EHLO) protocol command from a
connecting SMTP server, it responds by sending a status reply that
starts with the following:
250-<Exchange server ID>Hello<Connecting server ID>

<Exchange server ID> is the fully-qualified domain name (FQDN) of
the Exchange server <Connecting server ID> is either the FQDN or
the IP address of the server that initiated the connection.

The FQDN would be used if the Exchange5.5 IMC is able to resolve
this information through a reverse DNS lookup; the IP address
would be used if a reverse DNS lookup was not possible or failed
to resolve the connecting servers IP address.

A security vulnerability results because of an unchecked buffer
In the IMC code that generates the response to the EHLO protocol
command. If the total length of the message exceeds a particular
value, the data would overrun the buffer. If the buffer were
overrun with random data, it would result in the failure of the
IMC. If, however, the buffer were overrun with carefully chosen
data, it could be possible for the attacker to run code in the
security context of the IMC, which runs as Exchange5.5 Service

It is important to note that the attacker could not simply send
Data to the IMC in order to overrun the buffer. Instead, the
Attacker would need to create a set of condi... Read more

Read other answers


SSH Communications Security, Inc. has reported a serious vulnerability
in the SSH Secure Shell application that may allow remote attackers to
gain access to affected systems without a valid password. SSH is
typically used as a secure alternative to "telnet" for terminal
communications. This vulnerability may allow remote attackers to
compromise even the most heavily "hardened" systems




Read other answers

Firefox version 1.0.6 is out from Mozilla Org

A:Firefox version 1.0.6 (21 July '05)

There is also a new version of TBird. Both are to correct some problems with extension compatibilities.

Read other 1 answers

Definitions Version 200

Release Date: 7/7/2005
New Dial
Trojan.Downloader Stc
Trojan.Downloader Crypt
Spy Sheriff


False positives fixed:


Read other answers

I tried to boot the above Envy Notebook today (8th July) and the BIOS was corrupted. So I successfully flashed it via USB with the latest version, just published yesterday the 7th July. It may have been a pure coincidence around the date but was there some vulnerability in the previous BIOS ?("- Provides improved security of UEFI code and variables." ) Or is it more likely just to be my machine? (I haven't used the machine in a week or more, it was in hibernation.) Is there a changelog anywhere?    

Read other answers

The question mark is deliberate because this is a 'may be' which (so far as is known) only affects Safari users; http://www.h-online.com/security/ne...nerability-in-Windows-discovered-1398625.html

In common with so many of these reports this could be hopelessly exaggerated and its effects limited to BSOD's, but 64 bit users may want to be on the lookout for further announcements and/or patches.

A:Zero day vulnerability in 64 bit version?

I am sure Microsoft is looking at it to verify it is a Windows win32k.sys vulnerability or if the author got it wrong.

It won't take long if it is for real, malware distributors will find a way to use in in windows explorer and possibly other browsers.

Not may people use Safari in Windows, so its low risk.

Read other 2 answers

we have disabled SSL2 & SSL3 and TLS 1.0 also in my server but still showing 20007 - SSL Version 2 and 3 Protocol Detection vulnerability issue.
can you help me anyone ? 
Server SSL existing setting screenshot for your reference 

Read other answers

Hello, Im having problems installing microsoft update. I have changed my firewall setting accordingly but I cannot install the updates.

Please have a look if anything is wrong? Thank you
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 17:05:04, on 26/07/2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.5730.0013)
Boot mode: Normal

Running processes:
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\Program Files\COMODO\SafeSurf\cssurf.exe
C:\Program Files\Spyware Terminator\SpywareTerminatorShield.exe
C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
C:\Program Files\COMODO\Firewall\cmdagent.exe
C:\Program Files\Spyware Terminator\sp_rsser.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\Program Files\COMODO\Firewall\cfp.exe
C:\Program Files\Windows Live\installer\WLSetupSvc.exe
C:\Program Files\Mozilla Firefox\fi... Read more

A:Pls check if any conflict in my antivirus/spyware 26th July


Read other 2 answers

Several times recently I've received MicroSoft Vulnerability Check messages, and I'm not sure what, if anything, I should do in response.

The most recent check returned the following "problems":

Very High Office MS06-027
Very High Office MS06-060
Very High Windows MS06-061

I just ran Windows Update and found that there were no High-Priority Updates to run. I did install the following three optional program updates:

Network Diagnostic Tool KB91440

Update for Windows XP KB920342

MicroSoft Base Smart Card Cryptographic Service Provision Package x86 KB909520

Do I need to run the Office Update? I don't have MicroSoft Office on my computer, and I figure that's what it's referring to. I use OpenOffice instead.

Is this a matter I need to be concerned about, or am I getting these Vulnerability Check results by mistake? I would greatly appreciate hearing from anyone who can explain what's going on.

Thank you.

A:Solved: Results of MS Vulnerability Check

Read other 7 answers

I followed the Live Security Platinum Uninstall Guide on this site. In the end, Malwarebytes found the 3 scoundrels. But I can't connect to the internet. Well, to be more correct, the Local Area Connection shows me connected. To get to this point, I manually specified the ip information, since I couldn't get Winsock fixed, no matter what I did... various Fixit and http://seoroot.com/blog/networking/how-to-reset-winsock.html/ methodologies. The second issue is the firewall. I can't turn the Windows Firewall on or off. I can't access the settings at all. I downloaded the sharedaccess.reg fix suggested on another site and it got me a little further... the message now is that I have to start the ICS Service. Starting that service doesn't help and making it automatic start doesn't help. So, where do I go from here? Thanks

A:LIve Security Platinum Uninstall Guide July 1 doesn't work- "winsock" and firewall

DownloadFSS Checkmark all the boxesClick on "Scan".Please copy and paste the log to your reply.

Read other 15 answers

I recently downloaded the latest version of Comodo firewall. I found out that the whole interface has been changed.

Now I'm unable to find the option to show all connections going on at the current movement. Has the option been removed? Or is it some where else?

A:How to view firewall traffic in latest version of Comodo firewall?

[PDF] Comodo Firewall All the information that you need is in this PDF download -

Read other 5 answers

I uninstalled it from my computer.... downloaded AdCleaner and ran a scan. My MBAM REFUSES TO RUN......... and GOsave 3.0 is still in my extensions :/

A:GOsave version 3 point 0

Hi there,my name is Marius and I will assist you with your malware related problems.Before we move on, please read the following points carefully.First, read my instructions completely. If there is anything that you do not understand kindly ask before proceeding.Perform everything in the correct order. Sometimes one step requires the previous one.If you have any problems while following my instructions, Stop there and tell me the exact nature of your problem.Do not run any other scans without instruction or add/remove software unless I tell you to do so. This would change the output of our tools and could be confusing for me.Post all logfiles as a reply rather than as an attachment unless I specifically ask you. If you can not post all logfiles in one reply, feel free to use more posts.If I don't hear from you within 3 days from this initial or any subsequent post, then this thread will be closed.Stay with me. I will give you some advice about prevention after the cleanup process. Absence of symptoms does not always mean the computer is clean.My first language is not english. So please do not use slang or idioms. It could be hard for me to read. Thanks for your understanding.Important: To help me reviewing your logs, please post them in code boxes. You can create them by clicking on the <>-symbol on top of the reply window.    HijackThis is not the preferred initial scanning tool in this forum. With today's malware, a more comprehensive set of logs i... Read more

Read other 8 answers

Good Afternoon
Can you point me to the office 2016 that has this version of outlook , reminders work with this version

Users who have this version are not able to get reminders to pop up


A:point me to the office 2016 that has this version of outlook

You can't use IMG tags to post images that are on your computer. You can upload them as attachments or copy and paste them into a reply.

Read other 2 answers

I have to log into my company's intranet and I have DSL, my company bought me a DSL router (Linksys 4 port). I am having trouble getting Check Point VPN to work with the DSL and the Router. Can anyone help me find the answers to get this working?


A:Check Point VPN and DSL

Read other 6 answers

I have the latest PPoint version - the laptop I'm supposed to use for a presentation is running Windows 7 - will there be any issues here?

Read other answers


Tech Support Guy System Info Utility version
OS Version: Microsoft® Windows Vista™ Home Premium, Service Pack 2, 32 bit
Processor: AMD Athlon(tm) 64 X2 Dual Core Processor 4000+, x64 Family 15 Model 107 Stepping 1
Processor Count: 2
RAM: 893 Mb
Graphics Card: NVIDIA GeForce 6150 LE, 128 Mb
Hard Drives: C: Total - 230609 MB, Free - 144797 MB; D: Total - 7862 MB, Free - 901 MB;
Motherboard: ASUSTek Computer INC., Hematite-XL
Antivirus: AVG Anti-Virus Free Edition 2012, Updated and Enabled

A:Check point restart?

Are you referring to restoring a previous restore point in System Restore?

Start > All Programs > System Tools > System restore. Follow the directions on screen to select a previous restore point.

Read other 1 answers


A:Check point restart?

If your referring to a System Restore, just put in your Search area System Restore and it will come up, then just follow instructions to take it back to a specific time/date.

Read other 1 answers
A:does check point work with SED's?

I don't know but short of just waiting for a member with knowledge of this to respond I would suggest you contact Check Point Software Technologies and ask them. You can contact them here: Check Point - Security Appliances, Security Gateways, Firewall, Security Management, Endpoint Security & Software Blades

Read other 5 answers

Hi there,

I wonder if some good person can help me with this problem. I'm running Win XP Pro with SP2. I have a Master boot disk and a slave drive which is a Ghost image of the master. I'm having two problems with win xp on the master drive. the first one is with the Firewall. When I click on the icon of the Firewall it gives me the following message:

1. "Windows Firewall settings cannot be displayed because the associated service is not running. Do you want to start the windows Firewall/Internet connection sharing (ICS) service?" When I say yes I get the message:

"Windows cannot start the Windows Firewall/Internet connection Sharing (ICS) service."

2. When I click on System Restore it comes up with the message:

"System Restore Application has encountered a problem and needs to close."

There is a fix on the Microsoft web site for the 1st problem which I tried. It worked briefly then after another reboot, the same thing again.

I thought now that's where my Ghost image comes handy. I went and booted from the slave drive and checked that everything is fine with my ghost image, which it was. I then ghosted the slave to the master drive, turned the PC off, booted from the newly imaged master drive and I still get the same error. I tried again, this time deleting the partition on the master drive before ghosting it and same error.

My main question is, why isn't my ghost image working on the master drive?

and is the a fix f... Read more

Read other answers

While I try to boot my pc its giving error:
Alert! Previous attempts at booting this system have failed at checkpoint [smba]. For help in resolving this problem, please note this checkpoint and contact Dell Technical Support
I am unable to know what to do that again could boot my system. What to do in this case?  Its Dell 780 optiplex. 

A:check point error in optiplex 780

Replace BIOS CMOS battery. Reset BIOS to defaults: Clear CMOS - 3 Ways to Clear the CMOS - Reset BIOS Test RAM - Test with Memtest86+ for 5-6 passes or overnight.

Read other 1 answers


ISS has shipped protection for a flaw X-Force has discovered in CheckPoint
VPN-1 Server. The Check Point VPN-1 product is widely relied upon to
provide secure remote access to private networks from less trusted network
environments. When establishing an encrypted connection to a virtual
private network (VPN), it is possible for an attacker to trigger a buffer
overflow vulnerability in an ASN.1 decoding library within the VPN-1
Affected Products:

VPN-1/FireWall-1 NG with Application Intelligence R54
VPN-1/FireWall-1 NG with Application Intelligence R55
VPN-1/FireWall-1 NG with Application Intelligence R55W
VPN-1/FireWall-1 Next Generation FP3
VPN-1/FireWall-1 VSX FireWall-1 GX
VPN-1 SecuRemote/SecureClient All Versions



Read other answers

Hi there

As previously specified you can't install using the vmware wizard -- or at least using the product key supplied by MS -- it's invalid -- use the number given by Vrosa in this thread.

however if you create the VM manually remember to set the Boot from BIOS the ist time and set the vm to boot from the virtual (or real ISO if you are using a physical DVD)

This will allow you to change to boot order of devices for the VM at boot.

(Change it back again afterwards or you'ii get the install screen again and again).


A:Installing on Vmware - another point check the CORRECT serial nr -

Are we talking about VMware WorkStation ? if so, I choose the option " Install an OS later" and at the end I click on "Customize Hardware", and select the iso , and when I power the VM, it install perfectly

Read other 3 answers

NOTE: Your company must have either a SandBlast Appliance or access to the SandBlast Cloud Service in order to use this extension.

Chrome Web Store: Check Point SandBlast Zero-Day Protection - Read Description

Protects users from advanced malware, phishing and zero-day attacks by performing real-time analysis
Designed as an additional method for existing Check Point SandBlast customers to protect users from malicious websites malicious files downloaded using the Chrome browser, the SandBlast Web Extension blocks the most advanced and targeted web-based attacks from reaching your system.

Check Point SandBlast elevates threat prevention to the next level with evasion-resistant malware detection, all while ensuring rapid delivery of safe content. The extension provides a transparent interface for Chrome users to leverage three key capabilities:

Threat Emulation inspects incoming files within a secure sandboxing environment to detect even the most sophisticated zero-day threats.
Threat Extraction complements this solution by promptly delivering a safe reconstructed version of potentially malicious files, maintaining uninterrupted business flow.
Zero Phishing detects unknown phishing sites that target secure and confidential user information and prevents employees from reusing their corporate credentials on external sites
To learn more about Check Point SandBlast, please visit:
SandBlast Zero-Day Exploit Protection | Check Point Software

Video - For Informational Purposes

... Read more

A:Check Point SandBlast Zero-Day Protection (Enterprise Level)

Another bubble we can't test or see how it actually works. Half of this companies spend more money on this videos they make and marketing staff. I am sure of that.
This is basically something like deepviz i would assume with the extra it "cleans" files. Interesting but i can't test myself so i have 0 interest.

Read other 0 answers

My machine was rampant w/ spyware and other ickies. I think I've removed most of them, but I'm not sure-- I do keep getting devldr32.exe on my Windows Task Manager Processes screen, and can't locate the program where it's attached.

Also, a program called Slotchbar is in my Add/Remove programs list, but won't let me remove it. I can't find it in my C drive, so I don't know if it actually exists, or just the name from an old spyware program.

Here's my Hijack This log:

Logfile of HijackThis v1.99.1
Scan saved at 1:26:25 PM, on 5/11/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\Program Files\Canon\BJCard\Bjmcmng.exe
C:\Program Files\CA\eTrust EZ Armor\eTrust EZ Antivirus\isafe.exe
C:\Program Files\Canon\BJPV\TVMon.exe
C:\Program Files\Canon\BJCard\BJLaunch.exe
C:\Program Files\ISP50\Bin\Bartshel.exe
C:\Program Files\Common Files\Real\Update_OB... Read more

Read other answers

We developed an app using HTTPS, running on Windows 8.1 Pro, and the app is being used in an Proxy enabled environment.

We set the appropriate Proxy setting to the app, but, for some reason, the app cannnot reach the CRL distribution point for cheking the validity of the SSL certificate.

Our app designates the proxy to the Windows API, but it seems like WinInet/WinHttp is not using this proxy when checking for the certificate.

By using netsh winhttp set proxy xxxx, it can reach to the CRL distribution point via the proxy.

It looks like a some sort of bug, but not sure. Can anyone help us to solve the issue here?

Read other answers

If you install Zone Alarm's free Firewall, this is the free AV software that is offered with it. Even if you don't install it immediately, it can be easily installed from the Zone Alarm status screen that tells you about your Firewall's status.
I know their AV was contracted from Kaspersky, and that I haven't been infected since I un-installed AVG and opted for this (I wasn't being infected while running AVG either though). 
Does anyone know more?

A:Check Point free Anti Virus, any info?

Check Point Launches ZoneAlarm Free Antivirus + FirewallCheck Point releases ZoneAlarm Free Antivirus + Firewall

Read other 5 answers

Attention: Funkmeister and anyone else who uses ZA fire wall

In the latest version of ZA firewall (version the problem of not being able to run 'chkdsk /f or chkdsk /r' has been fixed. I tested it out.


A:ZA firewall version; information

good looking out

Read other 1 answers

I haven't seen this mentioned anywhere else here at TSG so here are the details; http://www.personalfirewall.comodo.com/

I haven't taken my usual excessively cautious approach but have downloaded and installed it and can still get online! Apparently it's completely different from the earlier version (it's four times bigger to download for a start) and it only works with XP and Vista.

If you decide to try it you will first have to uninstall any firewalls you currently have installed, including the earlier Comodo version.

A long silence from me in the future may indicate that I fouled up with the settings and am busily looking for the .exe file for the old version!

A:Comodo Firewall Pro Version 3 now available

Read other 16 answers

Yes new version 3.10.102194.530 is out.Version 3.10.101801.529 : 7th July, 2009 * NEW! COMODO Secure DNS is introduced as a new free service * NEW! COMODO HopSurf Toolbar - COMODO SafeSurf Toolbar has been discontinued and superseded by COMODO HopSurf Toolbar * NEW! CIS now allows the users to change the URL for the program and virus updates * IMPROVED! CIS now has a better support for Windows Security Center integration in Windows Vista SP1 and later * IMPROVED! AV engine now supports more archives and has better detection capabilities * IMPROVED! Direct disk access false alerts have been reduced * FIXED! Some applications do not run when CIS is installed in Vista 64 bit * FIXED! Antivirus scans excluded folders * FIXED! Firewall does not show some connections under high load * FIXED! Firewall sometimes causes the PC to freeze in windows XP 32 * FIXED! cfp.exe crashes when HIPS alerts timeoutBasically, during installation, now they offer Hopsurf toolbar instead of Ask toolbar. They also offer to use their own DNS servers. I think, in general, an average user wont need any of those.On the website the release date is given 7th July, 2009. Well today is 4th of July. I wonder why they put it to be 7th?The version mentioned is also different from what I downloaded (3.10.102194.530 which is higher version) I dont understand why?

A:Comdo Firewall 3.10 New version

The date thing came up as it was in American English which gives month,day, year as opposed to day, month, year so somehow the translation started with the month. Comodo say it was a boob and to disregard.
The original update was 3.10.529 but when people updated from 3.9 as opposed tp a clean reinstall found that Comodo wasn't keeping their settings and the 3.10.530 update corrected this. I have it installed and it is working the best ever with next to no popups whatsoever.

Read other 6 answers

Updated: Firewall Driver (security and other fixes)
Improved: Localization fixes
Improved: Stability and performance enhancements

If you are running ZoneAlarm Free Firewall 13 to protect your Windows computer, then you should know that a new version is now up for grabs, bringing a number of improvements and updates supposed to add a new layer of security to your system.

ZoneAlarm Free Firewall updates the firewall driver with security and other fixes, as the official release notes reveal, while also bringing localization enhancements, as well as stability and performance changes that should make everything run smoother on Windows.

As you most likely know if you?ve already installed the app in the past, ZoneAlarm Free Firewall is one of the most advanced security products of its kind, offering support for pretty much all Windows versions currently on the market.

Read other answers

For several days now, I've seen the words 'IPB image' in posts here instead of the picture in several places including Scarlet's signature. Other pictures show up just fine.

I right clicked on the words and was given the option to view the image. A new tab popped up, and then I saw "ad blocked by KPF." So now I knew that the firewall was blocking those images from appearing and identifying them as ads.

Unlike ZoneAlarm's ad-blocking settings which can be set for each site, Ad-blocking in the Kerio Firewall cannot be adjusted on a site by site basis; it's either on or off. Clicking on the 'set' button in the Kerio Firewall adblocking tab, a window pops up with a list of all the blocked ad types. Does anyone know which of these to allow in order to view the IPB images on Bleeping computer? The only option that I have discovered that works thus far is to stop the ad-blocking completely, but since I navigate to other sites when reading posts or articles on this site, I'm leery of doing that even though my default settings block all scripts.

Orange Blossom

A:Kerio Firewall Paid Version

I managed to solve the problem by clicking on the Set button on the Ad-blocking tab and removing the check marks in front of these two entries:.*/banners.*.*/banners/.*Orange Blossom

Read other 3 answers

As XP has its own built in firewall I cannot use Nortons AV - I have to disable one or the other. Does anyone know which is the better version to run in this case?

Thank you in advance

A:XP Home firewall v Nortons version

Windows' built-in firewall is better than nothing. I have no experience with Norton's firewall, except for some bad experiences with Norton's Security Suite, but I suspect that Norton's is better. From the way you've written your question, it's unclear whether you're speaking of Norton AV or Norton's firewall, but you must run both the anti-virus protection and the firewall.

Read other 4 answers

I am trying to download this Belkin Advisor program so I can have it tell me the guts of my computer for... who knows whar reason really. I got to get this info to Garmanma for him to help me. I successfully completed the download to my program files and when I clicked to open it I got an error message that read "not a valid Win 32 application". As I've seen this before today I thought maybe I should try opening the file with this new IZarc program to maybe unzip it..? I don't know what I'm doing really. So then I downloaded the Belcan Advisor again but this time I put it in my systems Win32 file and tried to open it from there. That error message read "access to the specified device or path or file is denied". What the heck am I doing wrong now? I re-read the Belcan sites FAQ and there was mention that my "firewall" might be denying something. I don't know that I have a firewall but I do have Avast downloaded on this Win2000 Pro and it's the free version and it seems to run all the time and I have never had this problem before so I don't know the answer. Any help?

A:Does the free version of Avast have a firewall?

Download SIW [with installer] Free versionhttp://www.gtopala.com/siw-download.htmlDownload it to your DesktopDouble-click on it and it should start right upAvast Free is just an AV

Read other 6 answers

Goodmorning Everyone,Okay, this may be a dumb question but I downloaded Outpost Firewall Trial version and a window popped up this morning telling me I only had five days left to use it. It is giving me the option to buy it. It works great for me but I thought it was freeware when I downloaded it. In anyones opinion, is it worth buying? $39.95 seems high just for firewall but I am only comparing to the crappy Nortons Security Suite that I finally took off. What a waste of money that was.[Moderator edit: moved post to more appropriate forum. jgweed]

A:Outpost Firewall Trial Version

I've tried Outpost, and the freeware I thought it was also prompted me ... to uninstall ... in favor of this one:http://www.majorgeeks.com/Sygate_Personal_...Free_d3356.htmlSygate was bought out recently by Symantec (Norton) but this firewall works just fine. free. imho

Read other 3 answers

Hello All

Have been on the Avast web site but have not been able to determine if the free version includes a firewall. Should anyone know the answer that would be great. What would I gain by purchasing their premium version? Using XP SP3.

Regards SilverSurf

Read other answers

How do I check what usb version driver I have for my Compaq Presario
84000NX ?

And whether the current usb driver file curently I am using is defective ?

What is the file name of the driver? usb.inf ? netusb.sys ?


Read other answers

I wonder how to check what version I.E im using now ?

And which the correct link download the latest I.E ?


A:how to check what version I.E im using ?

In IE, click the Help menu and click About Internet Explorer. This will show you the version and other info about your version. The latest version is IE7 (with IE8 just around the corner), available from Microsoft at this page: http://www.microsoft.com/windows/internet-...er/default.aspxNote: the page above has a big banner for downloading IE8 Beta 2. This is a test version and ought not be used unless you want to be a test monkey. Scroll down to where it says Select your Operating System to get IE7.

Read other 4 answers

I have been happily using the free firewall software from zonealarm, which I like because it doesn't have a lot of pop ups - i find those things annoying. My friend said I should upgrade to the firewall pro - but I don't know if it's worth the money. The pro version from zonealarm is only $30 and it comes with antispywear and identity theft protection - but I'm still not sure why upgrading is necessary. Can someone please tell me if any of the features on the pro software are worth the upgrade:

ZoneAlarm Pro Firewall 2010: Web Security with Spyware Removal and Internet Firewall Protection Software

A:free firewall software vs. paid version?

Frankly, I find Windows Firewall completely and perfectly adequate and see no reason to use any 3rd party program (especially one you have to pay to get). Windows Firewall used with the proper security software - and there are excellent options that are all free if you want recommendations there - (as opposed to 3rd party commercial (paid) firewall software with features otherwise available), you can be very well (just as well) protected.

Although I didn't answer your question directly, I think you understand the meaning of the reply.

I hope this helps.

Good luck!

Read other 8 answers

There is a new updated version available here for anyone interested
Free Download Link: http://smb.sygate.com/news/nwsdownload.htm

Read other answers