Results 1 to 6 of 6

Thread: What is first on the list?

Hybrid View

  1. #1
    Join Date
    Aug 2006
    Posts
    2,763
    Consider this as non informative and non libelous freedom of expression in jest or with humorous scarcastic manurisms. I hope you enjoy the time it takes to read this; my statements do not reflect the purpose or views of this site, it's members or it's opperators. Read at your OWN RISK :P

    in order of importance run za home free firewall version 4.5 or OLDER do the microsoft updates and and turn off automatic updates in windows and turn off check for updates in ZA, turn on "notify me when trying to connect" you can leave this window in the background, or close it when it pops up but be carefull when it pops up ad random times while accessing the internet because it is designed with the "submit info" button already selected so if you hit the wrong key's it sends your private info out on the internet! it gathers information about the applications and version numbers that are trying to access the internet, it gathers information about your opperating system, registry settings, and other things like what or where the application was trying to connect to, a hacker can intercept this info and use it to gather your information for their bossman, or use it to formulate an attack on your system to compramise it and do whatever they want afterwards, ie, intelectual property theft, borg your machine etc.. or all of the above and many other unmentioned things including breaking your computer's software configuration. Turn on hide IP address, turn on LOCK HOSTS file, DO NOT enter your paypal or ebay passwords into zone alarm firewall! Get a small application for windows to make the registry un-editable without promting for permission "know your registry settings" you will need to know why these changes take place, a new application needs to be added to the "startup" or run' or other area of the registry to that it can have some amount of automation, ie, you don't want the application to run at startup automatically, but the application like spybot search and destroy version 1.3 teatimer will tell you if it's setting itself up in the registry to do that and you can select accept or deny the registry changes etc.. But don't use spybot's teatimer, use something else that guards the registry and gives you better controll of what applications are trying to get away with on your pc, one without the obscured accept deny options and memory leak failures designed into the applications teatimer software made by a company that may or may not be on the take or under the gun of the corrupted law. Everything else you can volunteer to the law appon being served with a court order and or search warrant but only after consulting your attourny :P

  2. #2
    Join Date
    Aug 2006
    Posts
    2,763
    tea timer's application core may be limmited now that ms updated explorer or critical updates to ensure that teatimers pop-up windows were "obscured" then put in a policy that said if you want teatimer to work right you have to pay a royalty for the appropriate license agreement to use the software that we wrote to allow your application to work with our software, maybe teatimers authors decided that they don't want to pay any royalty's or something like that, see my above post for disclaimers :P

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •