<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-3682883957791226401</id><updated>2024-10-07T17:59:59.078+11:00</updated><category term="News"/><category term="best personal firewall software"/><category term="firewall testing"/><category term="free software"/><category term="online armor"/><category term="tall emu"/><category term="grc.com"/><category term="shieldsup"/><category term="Kaspersky"/><category term="do you need hardware and software firewall?"/><category term="hardware firewall"/><category term="new release 2.1.0.130"/><category term="runs safer"/><category term="secure browser"/><category term="software firewall"/><title type='text'>Online Armor&#39;s Official Blog</title><subtitle type='html'>As the CEO of Tall Emu, the company that produces Online Armor I&#39;m normally found in the Online Armor Support Forums. At the support forums I get to help people - here, I get to talk about anything. Although this blog is currently threadbare, it will be filled with my writings and hopefully some useful insight into the security debate and as a vehicle for OA announcements.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://onlinearmorpersonalfirewall.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://onlinearmorpersonalfirewall.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>20</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-3682883957791226401.post-7021586776717751061</id><published>2010-06-29T22:35:00.015+10:00</published><updated>2010-07-01T00:10:10.329+10:00</updated><title type='text'>Online Armor sold to Emsisoft</title><content type='html'>&lt;span style=&quot;;font-family:verdana;font-size:130%;&quot;  &gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Mike&#39;s final (OA) blog post - a personal note&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt; &lt;span style=&quot;font-size:100%;&quot;&gt;By the time you read this, the news will be public that Austrian-based Emsisoft, headed up by Christian Mairoll has aquired Online Armor from Tall Emu.  There&#39;s a been a bit of speculation over the last day or so that &quot;something&quot; was happening.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;During the past few weeks, we  started to prepare to transfer operational  control of Online Armor over  to Emsisoft &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;and a few things went live 48h or so before they were supposed to.  Oops.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;The deal is done, there&#39;s no going back and no regrets.  Indeed, Emsisoft aquiring Online Armor is the best possible thing that could happen to it.   Emsisoft has 20 staff focused on security software.   Tall Emu had two (OA developers) - and they just went to work for Emsisoft.  I can&#39;t wait to see what happens over the next 12 months with Online Armor and Emsisoft Anti-malware.&lt;br /&gt;&lt;br /&gt;A lot of people probably have a lot of questions, and I&#39;ve been asked a few times, so I&#39;ll try to answer them here.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;Why did you do it ?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;There&#39;s been many things that have been said about &lt;a href=&quot;http://www.tallemu.com.au/&quot;&gt;Tall Emu&lt;/a&gt; over the last few years; There&#39;ve been assumptions that we&#39;re a massive corporate with unlimited funds, people who think that it&#39;s &quot;all just that Mike bloke&quot;.  As usual, the truth is somewhere in between, although I wish it were closer to the first one, particularly the unlimited funds part.&lt;br /&gt;&lt;br /&gt;We&#39;re a small company, almost a family company in fact. Our main line of business has always been custom software development. That means, generally speaking, that when the guy that runs a winery needs software, he&#39;d come see us and we&#39;d write it for him.   We all have consulting backgrounds - going into businesses, figuring out what makes them tick - and then helping them automate their businesses.&lt;br /&gt;&lt;br /&gt;This is the main part of what Tall Emu does - and as part of it, and I hope Christian forgives me the plug - we developed a rather &lt;a href=&quot;http://www.totalenterprisecrm.com/&quot;&gt;flexible CRM system&lt;/a&gt; which is just starting to take off.&lt;br /&gt;&lt;br /&gt;Managing multiple customer projects, the development of a CRM system - and then, my consulting work (all of which pays the bills) it was clear that I&#39;d taken too much on personally, and something had to give. There are only so many hours in the day, and I was working most of them.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;That&#39;s when I called (well, skyped) Christian.  I told him the situation -and basically made him a simple proposition - if you want it, it&#39;s yours.   &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:verdana;&quot; &gt;Aren&#39;t you going to miss it? How can you leave&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;?&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;font-size:100%;&quot;&gt;Absolutely I am.  I&#39;ve met an awesome load of people over the last years, and I&#39;m very sad to be leaving Online Armor behind.   Having said that, selling OA lets me  focus on fewer things - and to do them better, rather than trying to do too many things  and doing them badly.&lt;br /&gt;&lt;br /&gt;And that&#39;s what it came down to.  If you imagine a normal workday, how many different tasks can you &lt;span style=&quot;font-weight: bold;&quot;&gt;really&lt;/span&gt; give your attention and focus to in any detail?  And that was the dilemma - what to do to ease that situation.  For a while, I neglected Online Armor a little -  but long terms that would simply have caused the product to slowly die.  It wasn&#39;t the outcome that was going to work for anyone.    Better to preserve it, and regain some semblance of a normal life outside of work than to allow it to die.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:verdana;&quot; &gt;Why Emsisoft?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;I&#39;ve worked with Christian over the  last year or so I&#39;ve gotten to know  him and there is nobody else that  I&#39;d be happy to sell OA to. In fact, we didn&#39;t even &quot;shop it around&quot; - we just spoke with Christian. That probably cost us a lot of money, but Christian and I enjoy a special relationship.&lt;br /&gt;&lt;br /&gt;There&#39;s a lot of trust there, and after spending time with him when he visited Australia earlier this year, I know he&#39;ll do the right thing by the product, the customers, the developers who are going to work with him.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:verdana;&quot; &gt;What&#39;s next ?&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;The future for OA looks good, and it&#39;s going to be an interesting  ride - just one, unfortunately that I am a little too tired to go along  on. While things might change over time, this forum will stay as it is -  there will be no immediate and dramatic changes, but of course change  will come. &lt;/span&gt;&lt;/span&gt; &lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt; I&#39;ll let Christian speak more to the future, though as I now move to the  past, but Christian and I both hope that you&#39;ll stay around and be part  of the future too.&lt;/span&gt;&lt;/span&gt; &lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;What I can tell you on Christian&#39;s behalf is this:&lt;/span&gt; &lt;/span&gt;&lt;ul  style=&quot;font-style: italic;font-family:verdana;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Product editions will stay untouched. Freeware edition will not  end of course.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Website remains on &lt;a href=&quot;http://www.online-armor.com/&quot; target=&quot;_blank&quot;&gt;www.online-armor.com&lt;/a&gt;, but we&#39;ll have to move  everything away from tallemu.* domains soon.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Forum remains, but moved to support.online-armor.com&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-style: italic;font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;Which kind of benefits does Emsisoft expect from the deal then?&lt;/span&gt; &lt;/span&gt; &lt;ul  style=&quot;font-style: italic;font-family:verdana;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;As part of a much larger development team (8 at Emsisoft so  far), OA development can progress faster. Sharing knowledge internally  is a very important factor for speed and quality of the produced  software.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;With the existing marketing and sales force at Emsisoft, we want to  spread the name about OA much more. It&#39;s a great product, winning tests,  but we need to tell everybody about it to make it grow.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;On the long run, we have plans to create some kind of a suite  product. It&#39;s gonna be a completely new product most likely. But things  are not finally decided yet.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:verdana;&quot; &gt;Final thoughts&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt; &lt;span style=&quot;font-size:100%;&quot;&gt;From me, the final words are simple:  Thank you.  It&#39;s been great. I&#39;ve  appreciated all the help you&#39;ve ever given, the fun parts and just  knowing this bunch of people from around the world. There&#39;ve been numerous beta testers, admins, volunteers, helpers and just enthusiasts.  It would be impossible to name everyone who&#39;s helped us, and I&#39;m writing this blog late at night here in Sydney in anticipation of the events to unfold.&lt;br /&gt;&lt;br /&gt;However, I&#39;d like to give particular thanks to our admin team, translation team, beta test team, private test team, Catprincess, our forum angel who collectively have helped us, and lots of Online Armor users around the world.   I&#39;d also like to offer a word of thanks to the hardworking team at Wilders Security - this is where Online Armor got it&#39;s first break, and has been our unofficial &quot;second home&quot; now since then.&lt;br /&gt;&lt;br /&gt;Oh, and if you need a CRM system...  ;)  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Subscribe in a reader&lt;/a&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/7021586776717751061'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/7021586776717751061'/><link rel='alternate' type='text/html' href='http://onlinearmorpersonalfirewall.blogspot.com/2010/06/online-armor-sold-to-emsisoft.html' title='Online Armor sold to Emsisoft'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3682883957791226401.post-1439386038024679378</id><published>2010-03-10T21:24:00.001+11:00</published><updated>2010-03-10T21:26:16.792+11:00</updated><title type='text'>Online Armor x64</title><content type='html'>I&#39;m not in the mood to ramble today.  Things have been real busy around TEHQ these past months.  Updating Online Armor, working with our awesome Private and beta test team to make sure that OA stays as good as it can possibly be - as well as all of the other business that Tall Emu does.&lt;br /&gt;&lt;br /&gt;The good news - I just decided to punch out a Beta version of OA64.  You need to be in our Beta team to see it, and it&#39;s not functionally complete - but there comes a time when you gotta show people what you got, rather than keep talking about it.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Mike&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Subscribe in a reader&lt;/a&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/1439386038024679378'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/1439386038024679378'/><link rel='alternate' type='text/html' href='http://onlinearmorpersonalfirewall.blogspot.com/2010/03/online-armor-x64.html' title='Online Armor x64'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3682883957791226401.post-8104307518255984565</id><published>2010-02-17T18:59:00.002+11:00</published><updated>2010-02-17T19:02:09.963+11:00</updated><title type='text'>Paypal Phish and banking mode</title><content type='html'>&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Paypal Phishing Email&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Last year, we received an email which was allegedly from PayPal.    I&#39;ve been meaning to write this up for a while, and now seems like a good time :)&lt;br /&gt;&lt;br /&gt;Knowing that it wasn&#39;t &lt;span style=&quot;font-weight: bold;&quot;&gt;completely &lt;/span&gt;beyond the realms of possibility that I&#39;d treated myself to a new toy without telling anyone, the mail was forwarded to me by Darryl.&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtqD9mGOz_N02M8GS3lc1qCvhNQN0JrbaGKGMDv1d3OWrF2MUrdkX9s4Y-tO1vsIJxI3tSz2ebDYYwGeTxVaDsd_PhALnliwuJWcNuj3pXvUUreh56v_-pRkH_I6D-4jeyy6O4yHLYGPZM/s1600-h/pp-header.png&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 204px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtqD9mGOz_N02M8GS3lc1qCvhNQN0JrbaGKGMDv1d3OWrF2MUrdkX9s4Y-tO1vsIJxI3tSz2ebDYYwGeTxVaDsd_PhALnliwuJWcNuj3pXvUUreh56v_-pRkH_I6D-4jeyy6O4yHLYGPZM/s320/pp-header.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5389294605133902178&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The email itself looks reasonably legitimate - but the fun part starts just a little further down the page - as you can see, the criminals have added a nice little &quot;If you didn&#39;t authorise this charge, click here to dispute transaction&quot;.    Cute.  The first thing many folks would think when getting a mail like this is &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;What the hell?  I never bought no mobile phone...&lt;/span&gt;&quot;  so the convenience of having that dispute link there is going to encourage people to click before they think.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVpkZX4AMjqr9FuhpPmBPyBQ-iBcC1pLdjQpnc7XNCFlML3z3MD8gO75a530rWh05LyvDVuJfwMz0XSbVaebk79RJ43wgpUuRuigOLSzH6WHVQPHvCIOk6SfL8HgWB-rpG6XqCaqLsKvPU/s1600-h/pp-dispute.png&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 320px; height: 247px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVpkZX4AMjqr9FuhpPmBPyBQ-iBcC1pLdjQpnc7XNCFlML3z3MD8gO75a530rWh05LyvDVuJfwMz0XSbVaebk79RJ43wgpUuRuigOLSzH6WHVQPHvCIOk6SfL8HgWB-rpG6XqCaqLsKvPU/s320/pp-dispute.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5389295487514244674&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Of course - clicking on the dispute transaction button takes you to a fake site (which is now offline).   The site itself was a very close clone of PayPal&#39;s official site.  It even drew in some images directly from PayPal.com - it really looked the business.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimuae22mzjdOxztrnpUEu2EnatcsZomF_lXhiIDQ1pshEQMFnTIRthj4HGEFcSsqgIYQfDBXx8M-UByXmTyKusaoxGcrXe3NQU15EUeAAhiCd_4rh_SNwNsbUhkJ-w28DE8j1s0h81jrQp/s1600-h/pp-phishy.png&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 236px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimuae22mzjdOxztrnpUEu2EnatcsZomF_lXhiIDQ1pshEQMFnTIRthj4HGEFcSsqgIYQfDBXx8M-UByXmTyKusaoxGcrXe3NQU15EUeAAhiCd_4rh_SNwNsbUhkJ-w28DE8j1s0h81jrQp/s320/pp-phishy.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5389297001286862898&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;While the site was live, I decided to log in and take a look around.  Of course, I didn&#39;t use my PayPal credentials - because it wasn&#39;t the real PayPal site - but I wanted to take a look around inside there, and see what was what.    &lt;span style=&quot;font-weight: bold;&quot;&gt;I would not recommend that you do this.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;I also thought that this would make a good test run of Online Armor&#39;s banking mode as it&#39;s designed for situations precisely like this.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;What Happened?&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Logging in, we&#39;re presented with a realistic looking PayPal fake site, complete with all of the menus - but telling you that &quot;Your account access is limited.  Remove this limitation&quot;.&lt;br /&gt;&lt;br /&gt;Under here was a form to collect info - and boy, did these guys go for gold.  Full name, date of birth, Mother&#39;s maiden name, country, address, SSN, home phone number...  credit card number, issuing bank, expiration date, CVV number, Pin Number (with a helpful looking &quot;Why is card signature/pin required&quot;   and an equally helpful &quot;Help finding your Card Verification Number.&lt;br /&gt;&lt;br /&gt;Just think for a moment;  Assuming that you&#39;d been fooled by this, you have just logged in (in other words, given them your PayPal account details) - and then you&#39;ve provided them with enough information for them to commit identity theft - or even just wholesale theft, depending on how greedy and cunning they are, they could:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Empty your account&lt;/li&gt;&lt;li&gt;Change your address and other details with the bank (and take control of your accounts)&lt;/li&gt;&lt;li&gt;Disconnect or divert your home phone&lt;/li&gt;&lt;li&gt;Disconnect your home internet&lt;/li&gt;&lt;/ul&gt;In other words - if you fall for this scam, you possibly hand the keys to your life to the criminals.  Consider - how did you identify yourself the last time you called your bank (or ISP, or phone company)?&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;How does Online Armor help me?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Online Armor has a safe online banking feature called Banking Mode.  It&#39;s designed precisely to counter situations where you may somehow be directed to a fake site.&lt;br /&gt;&lt;br /&gt;How it works is very simple:  It keeps a list of safe banking sites.  Before you do any banking, you should always activate banking mode.   Online Armor then will only connect to a site that is on your list, meaning that you cannot, even in a moment of weakness, fall for these scams provided you follow the discipline of engaging banking mode before you bank.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Subscribe in a reader&lt;/a&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/8104307518255984565'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/8104307518255984565'/><link rel='alternate' type='text/html' href='http://onlinearmorpersonalfirewall.blogspot.com/2010/02/paypal-phish-and-banking-mode.html' title='Paypal Phish and banking mode'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtqD9mGOz_N02M8GS3lc1qCvhNQN0JrbaGKGMDv1d3OWrF2MUrdkX9s4Y-tO1vsIJxI3tSz2ebDYYwGeTxVaDsd_PhALnliwuJWcNuj3pXvUUreh56v_-pRkH_I6D-4jeyy6O4yHLYGPZM/s72-c/pp-header.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-3682883957791226401.post-3307757732270847127</id><published>2009-11-30T22:20:00.004+11:00</published><updated>2010-02-17T18:54:25.048+11:00</updated><title type='text'>Going back to Paypal...</title><content type='html'>&lt;span style=&quot;font-size:130%;&quot;&gt;Why we&#39;re dumping RegNow and going back to Paypal.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;I was originally going to call this article &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;Paypal may suck, but at least it works&lt;/span&gt;&quot; but on reflection this would be grossly unfair to the guys at Paypal.&lt;br /&gt;&lt;br /&gt;While we had a number of comments from our users saying &quot;Paypal sucks&quot; that wasn&#39;t our experience.&lt;br /&gt;&lt;br /&gt;However, we do listen to our customers, and so we made the switch to RegNow after a timely email from one of their sales guys offering to do big things for us with their wonderful affiliate progam.&lt;br /&gt;&lt;br /&gt;Since ClixGalore was as useful as &lt;&lt;span style=&quot;font-style: italic;&quot;&gt;insert your favourite phrase here&lt;/span&gt;&gt; this seemed like a great situation.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;The customer is not always right&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;At least when it comes to selecting payment gateways :)&lt;br /&gt;&lt;br /&gt;A few things happened that put me off RegNow right away.&lt;br /&gt;&lt;br /&gt;When we got things up and running, we found out that a RegNow offer for about $12 or so was inserted as an option in the cart on each of our checkouts.   I can&#39;t remember if this was the software backup service (irrelevent to OA, as we always want to have our users on the latest version) or the licence key service.  In either case, we didn&#39;t want this, but we were right out of luck.  Fineprint.&lt;br /&gt;&lt;br /&gt;Immediately that we went with RegNow, our sales dropped, and they dropped fast. &lt;br /&gt;&lt;br /&gt;After a chat with RegNow we managed to get the thing removed (seems people hated it, because sales did increase again) but we had a different offer added instead which sucked almost as much.&lt;br /&gt;&lt;br /&gt;To this day, you still get the backup CD option which at least is useful for those that don&#39;t want to download the program, but we should be in control of what&#39;s in our cart and our customer experience.&lt;br /&gt;&lt;br /&gt;Online Armor users know that they can always get their key from us, automatically, and free, sent to the email address they signed up with.  A key backup &quot;service&quot; isn&#39;t really required for a product like Online Armor and sends a conflicting message.&lt;br /&gt;&lt;br /&gt;Still, some of our customers wanted us away from paypal - and so we stayed away.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Straws, Camels backs, etc&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;One might expect that RegNow, a company that specialises in the provision of Online Sales would be , ahem, how can I say this delicately...  good at it.   Unfortunately, in our experience we found that our own shopping cart looks better, performs better, is more user-friendly,  reliable - and it &lt;span style=&quot;font-weight: bold;&quot;&gt;works!&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Some months ago, I tried to apply a $20 discount to our products.  The maximum allowable was $10.   We&#39;ve seen times when the Regnow cart was simply offline - not with any error message, just  &quot;The document contains no data&quot;.    The much promoted affiliate program caused at least one of our affiliates to complain over lost sales and inability to track.&lt;br /&gt;&lt;br /&gt;Data from sales wasn&#39;t going into our system in an automated fashion, making support more complex than it needed to be and making it harder for users to use our members area.   We couldn&#39;t do half of the things that we wanted to do, in the way we wanted to do it.  There were problems with reporting.  It was a mess.&lt;br /&gt;&lt;br /&gt;The straw that broke the camels back was the problems handling what should be a simple transaction for a company that specialises in e-commerce. &lt;br /&gt;&lt;br /&gt;We had an offer for $30 off any Online Armor, and I&#39;ve had plenty of complaints from people because it was delivering a 30% discount instead.  Contacting Regnow support and we&#39;re told it will be fixed at some point in the future, and for now, we have to make a promo code for all of our products.   Right.   We&#39;re quite capable of looking like idiots from time to time without help.&lt;br /&gt;&lt;br /&gt;So, we decided to divorce ourselves from Regnow.  We&#39;ve implemented paypal express checkout in our own shopping cart.  Non-paypal users can check out with paypal and use their credit card.&lt;br /&gt;&lt;br /&gt;We&#39;ve taken back control of the customer experience and  I think we&#39;ve made the right decision, even if not everyone agrees with it.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Subscribe in a reader&lt;/a&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/3307757732270847127'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/3307757732270847127'/><link rel='alternate' type='text/html' href='http://onlinearmorpersonalfirewall.blogspot.com/2009/11/going-back-to-paypal.html' title='Going back to Paypal...'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3682883957791226401.post-7493395765618463126</id><published>2009-11-03T21:18:00.007+11:00</published><updated>2009-11-04T22:04:09.936+11:00</updated><title type='text'>Online Armor 4, Windows 7 and 2010 is fast upon us</title><content type='html'>&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Online Armor v4 is released with Windows 7 Support&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Just a few weeks ago Microsoft released Windows 7.  Unlike their Vista launch, Windows 7 looks like it&#39;s going to be huge.  I&#39;ll be installing it myself when I get a spare moment.&lt;br /&gt;&lt;br /&gt;Unlike when Vista Launched, we&#39;re only a couple of weeks behind with our Version 4 with Windows 7 support, which I am really, really happy to release today in Free, Premium and OA++ versions.  The release process has already started - should be done in a few hours.&lt;br /&gt;&lt;br /&gt;This really is an incremental update to Online Armor;  We&#39;ve added Win7 support of course (32-bit only for now), but we&#39;ve also fixed bugs, made performance enhancements and improved history logging to help you help yourself if something goes wrong.&lt;br /&gt;&lt;br /&gt;We&#39;ve also put a lot of effort these last few weeks into OASIS, trying to get as many files processed as possible to reduce popups.&lt;br /&gt;&lt;br /&gt;If you&#39;re an existing Online Armor user, we think you&#39;ll enjoy this upgrade;  If you haven&#39;t yet tried Online Armor we think we&#39;ll make a great first impression.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;...and some pricing changes&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Since we released Online Armor ++ we&#39;ve been closely monitoring feedback from our users, sales rates, complaints, compliments - general observations from our customers.&lt;br /&gt;&lt;br /&gt;One or two things become rather clear:  firstly, many people think that Online Armor premium is $39.95  &lt;span style=&quot;font-style: italic;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;per year&lt;/span&gt;&lt;/span&gt;.    And many people think that Online Armor Premium is too expensive.&lt;br /&gt;&lt;br /&gt;To solve this, we&#39;ve changed the pricing on Online Armor Premium.   As of today, Online Armor Premium is $19.95.    The price of subscription has also been changed to $19.95.   This means that we don&#39;t have to keep explaining that the first year is $39.95 and subsequent years are cheaper.&lt;br /&gt;&lt;br /&gt;As ever, you do not &lt;span style=&quot;font-weight: bold;&quot;&gt;need &lt;/span&gt;a subscription to continue to use &lt;span style=&quot;font-weight: bold;&quot;&gt;most &lt;/span&gt;Online Armor functions, but updates and server-side capabilities such as OASIS will not work without one.&lt;br /&gt;&lt;br /&gt;As a result of this change, we&#39;ve also dropped the pricing on our Family (3 User) and Family Plus (5 User) packs of Online Armor in line with the reduced pricing on Online Armor single user edition.&lt;br /&gt;&lt;br /&gt;The pricing of OA+ remains unchanged, save for a slight increase in annual subscription costs.   All in all, the pricing of our products is now fairer and more transparent.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;We&#39;re going to try these prices until the end of 2009 and see how they go.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;...thanks to our (extended) team, there is more to come&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;We&#39;re not a monster like Symantec; our development team is small; our support team is small and a large part of what we do is through the help of volunteers.   What sets us apart is the dedication of our team;  Our development team work all kinds of crazy hours - they hate anything that can get past OA;   our beta test team and our forum admins keep our support efforts on track.    We&#39;ve built a community of nice and friendly people over the last few years and we are very very proud of it.&lt;br /&gt;&lt;br /&gt;Now our development team is working on Windows 7 x64 - exciting times are ahead.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Mike&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Subscribe in a reader&lt;/a&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/7493395765618463126'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/7493395765618463126'/><link rel='alternate' type='text/html' href='http://onlinearmorpersonalfirewall.blogspot.com/2009/11/online-armor-4-windows-7-and-2010-is.html' title='Online Armor 4, Windows 7 and 2010 is fast upon us'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3682883957791226401.post-7660608960240534452</id><published>2009-06-16T21:32:00.003+10:00</published><updated>2009-06-16T22:58:23.495+10:00</updated><title type='text'>Online Armor: Best Practices - 1</title><content type='html'>&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;How to get the most out of Online Armor (without losing your hair)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;In order to get the most out of Online Armor, you really need to understand what it&#39;s for and how it&#39;s intended to be used.  If you understand these basic concepts, you&#39;ll understand what we&#39;re trying to do, how we&#39;re trying to do it - and hopefully how to make Online Armor slip into the background.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;What&#39;s Online Armor for ?&lt;/span&gt;&lt;br /&gt;When we first started developing Online Armor, it was called &quot;BankSafe&quot; and was designed to stop thieves emptying your bank account.  It had a very, very simple purpose, though none of the banks in Australia seemed to be too concerned about this at the time.     &lt;br /&gt;&lt;br /&gt;As we developed it, we had other ideas. The scope of protection was extended to cover anticipated (and then-current) threats.&lt;br /&gt;&lt;br /&gt;However, the basic principles remain the same:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;If a dangerous program is not allowed to run, it will not be able to do bad things&lt;/li&gt;&lt;li&gt;If you &lt;span style=&quot;font-weight: bold;&quot;&gt;do&lt;/span&gt; allow a program to run, and it starts to do things that are suspicious - tell the user about it.&lt;/li&gt;&lt;li&gt;If a trusted program runs, and does something that looks suspicious, don&#39;t alert- because it&#39;s trusted.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;It would be fair to say that Online Armor is for helping you keep bad things from happening to your computer, and to stop those bad things sending your data to the &quot;bad guys&quot;.  Designed to help you protect yourself against internet malice.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Any program that you trust, mark as trusted. &lt;/span&gt;&lt;br /&gt;On my laptop everything I run is marked as &lt;span style=&quot;font-weight: bold;&quot;&gt;trusted&lt;/span&gt;.  If I did not trust it, it would not be on my laptop.&lt;br /&gt;&lt;br /&gt;If you trust it, allow it to run as trusted.  You&#39;ll get NO popups if you trust all your safe programs, and have less chance of any problems.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;If you don&#39;t trust the program, uninstall it. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;I know some users try to control what programs can do, to try and limit them, to try and give them &quot;what they need&quot;.   That&#39;s not what it was designed for.  Stopping programs from doing things they need to do may cause unforseen issues.  If you understand this and want to fiddle with it - great.  If not - please don&#39;t.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Autoconfigure Trusted Programs for Internet&lt;/span&gt;&lt;br /&gt;One feature of OA I was very proud of was the idea that we could auto-configure trusted programs to access the internet.  I came up with this idea after hearing the CEO of one of our clients swearing that his personal firewall asked him  &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;all sorts of ******* stupid questions and broke his computer&lt;/span&gt;&quot;.&lt;br /&gt;&lt;br /&gt;Here&#39;s the logic:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;You install Yahoo Instant Messenger&lt;/li&gt;&lt;li&gt;This is a safe, Trusted program.&lt;/li&gt;&lt;li&gt;You want this to access the internet so that it can do what it does&lt;/li&gt;&lt;li&gt;You do not know (or care) about listening, ports, UDP, TCP, &quot;act as server&quot; and all that nonsense - you just want it to work!&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;Dodgy Analagy time:   &lt;span style=&quot;font-style: italic;&quot;&gt;Imagine a mechanic repairing your car. You ask him to do an oil change.  He asks you do you want him to use this wrench or that wrench to undo the bolt.  He asks you about the type of oil. He asks you how much oil to put in the car.  He asks you which oil filter to fit.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;How many times do you go back to that mechanic?    Autoconfigure trusted programs is the equivalent of saying to the mechanic  &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;Look buddy, do what needs to be done, I trust you, so get on with it already!&lt;/span&gt;&quot;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Make use of the &quot;Run Safer&quot; feature&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;I&#39;ve written about run safer before.  In simple terms, what it does is to limit the rights of programs to limit damage they might cause.&lt;br /&gt;&lt;br /&gt;Once you have trusted all of your programs  - and uninstalled the ones you don&#39;t trust :)  Then it&#39;s time to apply some run-safer settings to selected programs:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Internet Explorer,Firefox,Opera,Any other web browser&lt;/li&gt;&lt;li&gt;Yahoo, Skype, MSN, and any other chat program you use&lt;/li&gt;&lt;li&gt;Outlook Express, Outlook, Incredimail, The Bat! and any email program that you use.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;Now, you may think &quot;But I trust these programs, and now you&#39;re telling me to limit what they can do?&quot; - and the answer is YES!&lt;br /&gt;&lt;br /&gt;Chances are, right now, you&#39;re logged in as a user with administrative rights.  If you don&#39;t know what that means - then you definitely are - AND what that means is that programs that run get these rights too.  They can do anything to your computer.&lt;br /&gt;&lt;br /&gt;The problem arises when Great-Aunt Mabel gets infected - the virus sends you an email , you open it in Outlook Express and click the attachment.  Boom. That program can now do anything on your computer it wants.     Or, you&#39;re surfing a site and some strange file downloads and you accidentally run it.   BOOM!  That program too can do whatever it wants.   The same applies to files you download through Skype (or your messenger of preference).&lt;br /&gt;&lt;br /&gt;If you had used run-safer, then the running, malicious attachment or the downloaded file, or the file you got from Skype would be heavily restricted in what it could do.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Ok, you keep talking about Safe, trusted programs - what are they?&lt;/span&gt;&lt;br /&gt;A safe trusted program is not dangerous.  I know it sounds a little silly, but:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Programs you download from &lt;span style=&quot;font-weight: bold;&quot;&gt;Microsoft &lt;/span&gt;are safe, &lt;span style=&quot;font-style: italic;&quot;&gt;even if you think Microsoft is the Devil&lt;/span&gt;.&lt;/li&gt;&lt;li&gt;Programs you buy on a CD in a store are safe.&lt;/li&gt;&lt;li&gt;Programs you get from trusted sources are usually safe.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;If in doubt, you can use Google (or Bing) to do a bit of research before you install.&lt;br /&gt;&lt;br /&gt;Generally speaking - big companies like Amazon, Yahoo, Electronic Arts, Quicken and so on - let&#39;s call em the brand names - are not going to release malicious software.   &lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;I know Sony did something &lt;/span&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;stupid &lt;/span&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;a few years back, but this was &lt;/span&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;stupid&lt;/span&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;, not malicious. Online Armor is not designed to protect you from stupid.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Some programs that are &lt;span style=&quot;font-weight: bold;&quot;&gt;not &lt;/span&gt;going to be safe:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Something that tries to download automatically when you go to a web page is &lt;span style=&quot;font-weight: bold;&quot;&gt;never &lt;/span&gt;going to be good.&lt;/li&gt;&lt;li&gt;Something you receive in email is unlikely to be good.&lt;/li&gt;&lt;li&gt;A web page that keeps popping up until you accept a program to install - this is almost always going to be bad, and it would be better to &quot;end task&quot; or power-off your computer.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;If you followed my advice...&lt;/span&gt;&lt;br /&gt;... then you should have trusted programs running on your computer.  Your browsers and email clients should be set to Run Safer, which will help to protect you against dodgy drive-by downloads and email/messaging malware.   You will have your trusted programs automatically configured for internet.&lt;br /&gt;&lt;br /&gt;Using Online Armor like this should result in very few (if any) popups asking you hard questions that make you want to tear your hair out.  Your programs will work.  Runsafer will prevent (or at least limit damage) if you accidentally run something from a website you shouldn&#39;t have.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Subscribe in a reader&lt;/a&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/7660608960240534452'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/7660608960240534452'/><link rel='alternate' type='text/html' href='http://onlinearmorpersonalfirewall.blogspot.com/2009/06/online-armor-best-practices-1.html' title='Online Armor: Best Practices - 1'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3682883957791226401.post-4783094841296621780</id><published>2009-05-28T13:58:00.001+10:00</published><updated>2010-09-03T22:04:02.350+10:00</updated><title type='text'>Watch out for the muppets :)</title><content type='html'>&lt;span style=&quot;font-size: 130%; font-weight: bold;&quot;&gt;Muppets. They&#39;re everywhere. &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
I don&#39;t mean Jim Henson&#39;s friendly bunch, but the English term for someone lacking a bit of skill or intelligence.  Though it&#39;s an insulting term, it&#39;s rather mild and quite cute - and the topic for today&#39;s blog post.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: 130%; font-weight: bold;&quot;&gt;Why are muppets relevent to security?&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
The internet has democratised communications.  Anyone with a keyboard and a thought can combine the two and reach people all over the world.  Sometimes &lt;a href=&quot;http://www.wikipedia.org/&quot;&gt;this is a good thing&lt;/a&gt;.   Other times - not so good.&lt;br /&gt;
&lt;br /&gt;
Anyone on twitter can shout out a thought - and have it reproduced.  Businesses or indidivuals can communicate - and say things that are true, not true, right or wrong - and people will read it and disseminate it.   How many internet hoaxes have you read about recently?&lt;br /&gt;
&lt;br /&gt;
The problem arises when people say things with an air of authority that they know nothing about.   For example,  a &lt;a href=&quot;http://twitter.com/TweetTrend&quot;&gt;muppet&lt;/a&gt; &lt;a href=&quot;http://twitter.com/TweetTrend&quot;&gt; &lt;/a&gt;tweeted out a security alert yesterday saying that Online Armor contained advertising software.   Obviously, it doesn&#39;t.&lt;br /&gt;
&lt;br /&gt;
Rather than get upset, I did the right thing - tracked him down and told him about his mistake.&lt;br /&gt;
&lt;br /&gt;
His reply was basically &quot;McAfee alerted&quot;.   I advised this was a false positive.  &lt;br /&gt;
&lt;br /&gt;
His response was &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;Hmmm, can&#39;t find that term in any McAfee help or support groups.   Good luck with that!&lt;/span&gt;&quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: 130%; font-weight: bold;&quot;&gt;Be careful who you listen to&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Typing the words &quot;false positive&quot; into google (without the quotes) finds multiple definitions, and quickly.   So, we have some Jason Remington  issuing &lt;span style=&quot;font-weight: bold;&quot;&gt;public security alerts&lt;/span&gt; about our product - yet he has never heard of a false positive and couldn&#39;t find it on the internet.  I think we have our first &quot;Muppet of the Day&quot;.&lt;br /&gt;
&lt;br /&gt;
When you read something, give consideration to the source.&lt;br /&gt;
&lt;br /&gt;
The text of the tweet was &quot;&lt;span class=&quot;status-body&quot;&gt;&lt;span class=&quot;entry-content&quot;&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;QZVX WARNS OF ONLINE THREAT:(Online Armor) Firewall FREE download contains ADWARE and other nuisance software that may harm your PC .&lt;/span&gt;&quot;&lt;br /&gt;
&lt;br /&gt;
I looked up the site in question - it&#39;s&lt;a href=&quot;http://www.qzvx.com/&quot;&gt; here.&lt;/a&gt; Hardly credible.&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Get advice from the right place&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
There are a multitude of sources of good advice on the internet - techsupport alert,spyware hammer, wilders security forums, calendar of updates, smokey security forums, vendor forums - and many more. &lt;br /&gt;
&lt;br /&gt;
Where do you go for security advice?  Have you any entries for the &quot;Muppet of the day&quot;?   Let me know.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mike&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Subscribe in a reader&lt;/a&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/4783094841296621780'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/4783094841296621780'/><link rel='alternate' type='text/html' href='http://onlinearmorpersonalfirewall.blogspot.com/2009/05/watch-out-for-muppets.html' title='Watch out for the muppets :)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3682883957791226401.post-7952854205365056075</id><published>2009-05-18T11:03:00.000+10:00</published><updated>2009-05-18T12:24:07.683+10:00</updated><title type='text'>Ask Toolbar in Online Armor Free?   Nearly...</title><content type='html'>There&#39;s been a lot of discussion about the Ask toolbar recently over at Wilders Security and the Calendar of Updates forums.    We have a variety of vendors that are now bundling this bar with their products - something that I thought we&#39;d never, ever do.&lt;br /&gt;&lt;br /&gt;Then I read a thread over at Wilders where someone pointed out that for every time Ask bar was installed, the vendor got a dollar.   I mulled over our OA Free download numbers and thought that this figure was highly likely to be inflated - but at a dollar per download - wow, that&#39;s some serious money.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Bundle Ask Toolbar and have an early retirement?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;I then read a comment from BillP of Winpatrol fame saying that Ask had approached him - and - had he proceeded with them, he could have made enough money to retire in a few months.  Bill basically told the guys to get stuffed - but there are a lot of other &lt;a href=&quot;http://www.calendarofupdates.com/updates/index.php?showtopic=16253&quot;&gt;vendors that bundle the bar&lt;/a&gt; who didn&#39;t.&lt;br /&gt;&lt;br /&gt;Having had two independent sources confirm just how much money could be made, I did what any self-respecting business owner would do - I contacted Ask to find out what the deal was.  After all - if I could add tens of thousands of dollars to our bottom line every month, I&#39;d be mad not to consider it, right ?&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;The Scoop&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;At the same time as I contacted Ask, Ask contacted me asking about business relationship opportunities.   The chap on the phone I spoke with explained to me that the numbers quoted at Wilders were not &lt;span style=&quot;font-style: italic;&quot;&gt;quite&lt;/span&gt; reality - but for the purposes of basic math, we&#39;ll stick with the $1 per install&lt;br /&gt;&lt;br /&gt;In other words, for a company like us - a small business out of Sydney - the Ask toolbar sounds like a dream come true.  Call it free money. Call it monetizing our free product - we did both.   Based on our download numbers we&#39;d stand to make tens of thousands of dollars per month - all for including a harmless toolbar in our program.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Sometimes, I hate the internet&lt;/span&gt;...&lt;br /&gt;&lt;br /&gt;Here&#39;s the problem.  Imagine that you could get paid a dollar for each unique user.  Imagine that you were moderately skilled at writing malcious code and had no morals.  You could make a lot of money real fast by surrupticously installing something like this.   And that&#39;s what people did.   Ask were tarred with this brush.&lt;br /&gt;&lt;br /&gt;As we proceeded along the path with Ask, we took note of the questions that they asked us and the hoops we had to jump through to sign up as a partner. They were really, really concerned to prevent malicious folks from bundling their bar.&lt;br /&gt;&lt;br /&gt;It was unfortunate that they had been abused by malware writers and scammers - I&#39;d hate for that to happen to us if we paid bounties for installation of Online Armor - but they shouldn&#39;t be nailed for this forever.  Not only do they try to run a clean ship , but they were also a victim, right ?   &lt;br /&gt;&lt;br /&gt;This thinking gave us a bit of confidence going forward - as did the fact that a lot of our competitors, from the rats and mice upwards had done this.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;...but most of the time it rocks&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;We decided that we&#39;d proceed with the Ask toolbar.  The money looked great. The company was clean. Our competitors were doing it.  There were shouts at some of the guys that did it - from a highly vocal crowd - but we figured that provided we did it the right way  (no default opt-in, no tricky wording or saying that the bar was required for security purposes) we&#39;d be ok.&lt;br /&gt;&lt;br /&gt;I took this to our private test team.  They hated it.   I took it to our forum admins.  They hated it too.  I took it to our Beta team after someone came out and said &quot;You would never bundle a toolbar would you ?&quot; - and I said, &quot;um, actually yes, we would&quot;.    They hated it too.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;A rock and a hard place&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;On one hand, we have a way to boost our business by the tunes of tens of thousands of dollars per month.  In this economy, that sort of money is not to be sneezed at - hell, in &lt;span style=&quot;font-weight: bold;&quot;&gt;any&lt;/span&gt; economy the chance to quickly add a quarter-million USD per year to the bottom line with minimal effort is not to be sneezed at.&lt;br /&gt;&lt;br /&gt;Unfortunately, adding that bar would mean that our users would hate us. Vocally.  Is it rational hatred?  Who cares.    Hate is hate, and Vocal is Vocal.   We&#39;d already noted one of the smaller players get slammed for their search bar antics.&lt;br /&gt;&lt;br /&gt;In all of our discussions and observations, some key points kept getting repeated:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Users &lt;span style=&quot;font-weight: bold;&quot;&gt;do not expect a security tool to install unneeded items&lt;/span&gt;, even if that security tool is free.&lt;/li&gt;&lt;li&gt;Default opt-in is the only way people will install due to &lt;span style=&quot;font-weight: bold;&quot;&gt;inattention, accident or trickery&lt;/span&gt; of wording.&lt;/li&gt;&lt;li&gt;Default opt-in is wrong.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Users place a lot of trust in security vendors. They are trusted to do the right thing. Do not &lt;span style=&quot;font-weight: bold;&quot;&gt;abuse that trust&lt;/span&gt;.&lt;/li&gt;&lt;li&gt;Is it &lt;span style=&quot;font-weight: bold;&quot;&gt;ethical&lt;/span&gt; to ask your users to install a product you would not install and use yourself?&lt;/li&gt;&lt;/ul&gt;Out of all of them, the last one got to me the most. I installed the bar and had a look.  If this was on my computer, I would remove it.  &lt;br /&gt;&lt;br /&gt;In fact - the ICQ bar is even worse - the uninstaller didnt work correctly and now I find myself trying to do a google search and sometimes getting ICQ.  It&#39;s  &lt;span style=&quot;font-weight: bold;&quot;&gt;really, really annoying&lt;/span&gt;.   Do I want to really, really annoy our users?&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;The upshot.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;When we started our Online Armor project, we somehow stumbled onto a simple formula.  Listen to our users, and give them what they want.  Provided they don&#39;t want free ponies and chocolate, it&#39;s a model that  works rather well.   Everyone wins.&lt;br /&gt;&lt;br /&gt;Our users - the ones privvy to the pre-launch information told us pretty clearly &quot;&lt;span style=&quot;font-weight: bold;&quot;&gt;We don&#39;t want this, and we don&#39;t think it&#39;s right&lt;/span&gt;&quot;.   When your &lt;span style=&quot;font-style: italic;&quot;&gt;friends &lt;/span&gt;are telling you it&#39;s not a good idea - imagine what people who don&#39;t have that relationship will say or do.  &lt;br /&gt;&lt;br /&gt;So - we&#39;ve decided not to proceed with Ask, though they&#39;d probably pay us nearly enough to &lt;a href=&quot;http://carpoint.com.au/used-car/FERRARI/F430/South%20Australia/csn6981541.aspx&quot;&gt;buy a nice car&lt;/a&gt;. &lt;br /&gt;&lt;br /&gt;When the numbers look good from a financial perspective, and &quot;everyone else is doing it&quot; - it&#39;s easy to fall into complacently thinking that all will be fine.   It&#39;s not fine for security companies to bundle someone elses toolbar.  We lost sight of that for a moment and nearly did everyone a disservice.&lt;br /&gt;&lt;br /&gt;Why did we decide not to proceed?  Well, the money sure would be nice but at what cost?   Bundling this bar would lead to a loss of trust...   and that&#39;s something you generally only get to lose once.  &lt;br /&gt;&lt;br /&gt;I&#39;ll get the car another day.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Subscribe in a reader&lt;/a&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/7952854205365056075'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/7952854205365056075'/><link rel='alternate' type='text/html' href='http://onlinearmorpersonalfirewall.blogspot.com/2009/05/ask-toolbar-in-online-armor-free-nearly.html' title='Ask Toolbar in Online Armor Free?   Nearly...'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3682883957791226401.post-6148703442564441031</id><published>2009-03-23T10:36:00.000+11:00</published><updated>2009-03-23T23:09:05.300+11:00</updated><title type='text'>Phishing Scammer tries it on with CEO of an Anti-phishing software product “Online Armor”</title><content type='html'>So, I&#39;m sitting there today working on something for a client when I received &lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjygFprawyn8IxyhNBQLt2MMPtcliBiaNn8mBcKj5mSYdWyAnmjeRjkEST_9oiFs3Al0WdhENyvgzws6R2EeGfrjssIOdAHpqG1vPIk3RCCQV03TSBJs9e9aqliUVMwk4iYnLLX-FySkoP1/s1600-h/wow2.JPG&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 285px; height: 400px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjygFprawyn8IxyhNBQLt2MMPtcliBiaNn8mBcKj5mSYdWyAnmjeRjkEST_9oiFs3Al0WdhENyvgzws6R2EeGfrjssIOdAHpqG1vPIk3RCCQV03TSBJs9e9aqliUVMwk4iYnLLX-FySkoP1/s400/wow2.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5315113982600679634&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;an unsolicted Skype Message with an &quot;Important Business Proposal&quot;.&lt;br /&gt;&lt;br /&gt;I normally mess with these guys a little, just to waste their time , but as I was on the phone to a client I just decided to get rid of him quickly.&lt;br /&gt;&lt;br /&gt;As you can see - he was suprisingly honest about his ultimate intentions.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;This is how the scam works&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Mr Dutu, or Mrs Dutu is usually writing to you from a yahoo or other free email address. It usually doesn&#39;t address you by name. It always offers some opportunity - usually, the chance to get a share of millions of dollars in exchange for some assistance.&lt;br /&gt;&lt;br /&gt;A common theme is the widow of a Nigerian official (or just a corrupt Nigerian official) wants to move $250M (usually spelled as TWO HUNDRED AND FIFTY MILLION DOLLARS) out of the country. He or she just needs a partner overseas.&lt;br /&gt;&lt;br /&gt;They offer a split of the money. Often there is the chance of further profits (we&#39;d like to invest in real-estate in your country, and we will give you 10% of the profits). Quite often, they thank God for His mercy in finding someone as kind as yourself to help them.&lt;br /&gt;&lt;br /&gt;So, you&#39;re probably asking yourself - how does this scam work? They want to send you $250M - it&#39;s going to your bank account - what&#39;s the catch? This scam has been going on for years, and it&#39;s called Advanced Fee Fraud.&lt;br /&gt;&lt;br /&gt;Had I accepted this guy&#39;s offer, here&#39;s what likely would have happened:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;He&#39;d ask me for some ID - passport and bank account details for the money&lt;/li&gt;&lt;li&gt;He&#39;s send me some official looking documentation - fake of course - which would allow me to claim the money from some third party. The third party would probably also have a free email address too (like Yahoo or Hotmail).&lt;/li&gt;&lt;li&gt;The third party (Notary, Bank Manager) would contact me about claiming my money - and here&#39;s the catch - there&#39;s a $20 fee for stamping the document. Or a $200 fee.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Mr Dutu would claim not to have this money, but of course, since I will soon get 10% of $250M,  $200 is not much to pay.&lt;/li&gt;&lt;li&gt;I&#39;d send the money - and the documents would be &quot;stamped&quot;.&lt;/li&gt;&lt;li&gt;Once they&#39;d got me for $200 - there would be some other issue... and the costs would keep rising and rising until they couldn&#39;t get any more money out of me.&lt;/li&gt;&lt;/ul&gt;It&#39;s a sad fact that in tough economic times, people get desparate and take risks or chances that they wouldn&#39;t normally take in the hope of the &quot;one big win&quot; that would solve all their problems. You can imagine being in dire straights, and having invested $2,000 or so , thinking another $500 can&#39;t hurt.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Don&#39;t get caught out.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;I&#39;ve told the guy to go and find an idiot. Don&#39;t let it be you - seriously - if it looks too good to be true, it probably is. The chance that some corrupt official is going to send you $250M dollars and let you keep 10% of it is pretty remote to say the least.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Don&#39;t be the Idiot:  Mr Dutu Returns&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;It was a Friday afternoon, and about an hour since my chat with &quot;Mr Dutu&quot; - too early to go for a beer, too late to do much work.  I could see he was still online.&lt;br /&gt;&lt;br /&gt;So I thought I&#39;d ask him a few questions...&lt;br /&gt;&lt;br /&gt;[3:56:08 PM] Mike Nash says: Any luck yet ?&lt;br /&gt;[3:56:48 PM] Mr. Robert Dutu says: just 1&lt;br /&gt;[3:56:54 PM] Mr. Robert Dutu says: for over three hours&lt;br /&gt;[3:57:07 PM] Mike Nash says: :(  Business getting slow for you?&lt;br /&gt;[3:57:13 PM] Mike Nash says: May I ask, how much you make doing this ?&lt;br /&gt;[3:57:47 PM] Mr. Robert Dutu says: &lt;span style=&quot;font-weight: bold;&quot;&gt;be my victim and you will get to know how much i can make from you&lt;/span&gt;&lt;br /&gt;[3:58:05 PM] Mike Nash says: (rofl)  Very good :)&lt;br /&gt;[3:58:10 PM] Mike Nash says: You&#39;re a funny guy&lt;br /&gt;[3:58:20 PM] Mr. Robert Dutu says: thanks (handshake)&lt;br /&gt;&lt;br /&gt;I ended up chatting with him for about an hour - and I have to say, he was a funny guy.  A criminal, sure - but he claimed he was from Ghana, and had been doing this for only three months.  He even tried to get some money out of me - but despite how amusing the guy was, he&#39;s still a criminal, and relies on trickery and social engineering to get what he wants - which is cash.&lt;br /&gt;&lt;br /&gt;[3:58:51 PM] Mike Nash says: Seriously, do you really find many people that fall for this scam still?   Though, I read in the newspaper than something like $100M leave the country each year&lt;br /&gt;[3:59:23 PM] Mr. Robert Dutu says: what scam?&lt;br /&gt;[3:59:31 PM] Mr. Robert Dutu says: this is real&lt;br /&gt;[3:59:34 PM] Mike Nash says: The advance fee fraud&lt;br /&gt;&lt;br /&gt;[3:59:42 PM] Mr. Robert Dutu says: i will send you details on it&lt;br /&gt;[4:00:11 PM] Mike Nash says: Over Skype?&lt;br /&gt;&lt;br /&gt;[4:00:23 PM] Mr. Robert Dutu says:  This message has been removed&lt;br /&gt;&lt;br /&gt;***Note - he pasted here the generic phishing email - which described how we&#39;d share $16M.  It was really, really well written in comparison to those that I&#39;d normally get.  ***&lt;br /&gt;&lt;br /&gt;[4:01:11 PM] Mike Nash says: Nice.  That&#39;s actually quite well written.  And instead of $250M , you&#39;re saying $16M...&lt;br /&gt;&lt;br /&gt;[4:01:29 PM] Mike Nash says: So, what&#39;s the next step?&lt;br /&gt;[4:02:20 PM] Mike Nash says: Actually, I work for a security ecompany - this is why I am so interested&lt;br /&gt;&lt;br /&gt;[4:02:22 PM] Mr. Robert Dutu says: wait, i have a client&lt;br /&gt;[4:02:25 PM] Mr. Robert Dutu says: he is discussing positive&lt;br /&gt;[4:02:26 PM] Mike Nash says: ok&lt;br /&gt;&lt;br /&gt;It was interesting the way he refered to his victims as clients. He offered me the chance to see the chat history with his &quot;client&quot; - but then it went a little bad...&lt;br /&gt;&lt;br /&gt;[4:04:29 PM] Mr. Robert Dutu says: and put it on the internet right?&lt;br /&gt;[4:04:36 PM] Mr. Robert Dutu says: no&lt;br /&gt;[4:04:44 PM] Mr. Robert Dutu says: you will spoil my job&lt;br /&gt;[4:04:54 PM] Mike Nash says: Not a chance!&lt;br /&gt;[4:05:01 PM] Mike Nash says: There&#39;s already lots of articles about it&lt;br /&gt;[4:05:14 PM] Mike Nash says: and I bet, you do not use this account for more than some days at a time, right ?&lt;br /&gt;[4:05:22 PM] Mike Nash says: Next time it will be some other name&lt;br /&gt;[4:06:08 PM] Mr. Robert Dutu says: why all this question&lt;br /&gt;[4:06:16 PM] Mr. Robert Dutu says: do you want to join?&lt;br /&gt;[4:06:25 PM] Mike Nash says: No, I don&#39;t :)&lt;br /&gt;&lt;br /&gt;[4:06:34 PM] Mr. Robert Dutu says: good&lt;br /&gt;[4:06:48 PM] Mr. Robert Dutu says: what is your job?&lt;br /&gt;[4:06:51 PM] Mike Nash says: I think I could improve the text of your letter a bit - but it is better than 99% of the ones I receive normally&lt;br /&gt;[4:07:05 PM] Mike Nash says: I work in security industry, we write a personal firewall product&lt;br /&gt;[4:07:20 PM] Mike Nash says: it also detects things like keyloggers&lt;br /&gt;[4:07:37 PM] Mr. Robert Dutu says: very good&lt;br /&gt;[4:07:45 PM] Mr. Robert Dutu says: what is your pay?&lt;br /&gt;&lt;br /&gt;I made up a number, and told him, and then added:&lt;br /&gt;&lt;br /&gt;[4:09:12 PM] Mike Nash says: what&#39;s yours?&lt;br /&gt;&lt;br /&gt;He was very very evasive about how much he earned, until he told me that he&#39;d only ever made EUR50 from a woman in the Philipines.  Of course, he could be sitting there in a $5000 chair in his private compound saying that for all I know.&lt;br /&gt;&lt;br /&gt;[4:09:56 PM] Mr. Robert Dutu says: sorry for my late reply&lt;br /&gt;[4:10:00 PM] Mr. Robert Dutu says: was busy with a client&lt;br /&gt;[4:10:07 PM] Mr. Robert Dutu says: you earn alot of money&lt;br /&gt;&lt;br /&gt;[4:10:09 PM] Mike Nash says: I like the way you call them clients&lt;br /&gt;[4:10:21 PM] Mike Nash says: It implies a certain professionalism&lt;br /&gt;[4:10:26 PM] Mr. Robert Dutu says: thanks&lt;br /&gt;&lt;br /&gt;[4:10:35 PM] Mike Nash says: Cost of living here is higher.&lt;br /&gt;[4:10:47 PM] Mr. Robert Dutu says: if i ask you to send me some money will you?&lt;br /&gt;&lt;br /&gt;[4:11:20 PM] Mike Nash says: What would I recieve in exchange for a payment?&lt;br /&gt;[4:13:17 PM] Mr. Robert Dutu says: am back&lt;br /&gt;[4:13:24 PM] Mr. Robert Dutu says: that is the point&lt;br /&gt;[4:13:34 PM] Mr. Robert Dutu says: nobody wants to give anything out for free&lt;br /&gt;[4:14:21 PM] Mr. Robert Dutu says: &lt;span style=&quot;font-weight: bold;&quot;&gt;but if i promise you $16million usd i will end up getting more than your pay from you&lt;/span&gt;&lt;br /&gt;[4:14:40 PM] Mr. Robert Dutu says:&lt;span style=&quot;font-weight: bold;&quot;&gt; you might even go to the extent of taking loan for me&lt;/span&gt;&lt;br /&gt;[4:14:54 PM] Mr. Robert Dutu says: which is very improper&lt;br /&gt;&lt;br /&gt;This is actually quite sad.  I&#39;ve read stories in the paper of this - but never seen the scammers side of it before.   He drifted off into trying to get a bit of sympathy from me, and then started to ask me for money...&lt;br /&gt;&lt;br /&gt;[4:34:37 PM] Mr. Robert Dutu says: can you be of any assistance?&lt;br /&gt;[4:34:39 PM] Mike Nash says: It&#39;s a Friday - everyone thinks of the weekend, and the pub&lt;br /&gt;[4:34:41 PM] Mike Nash says: wrong time of day&lt;br /&gt;&lt;br /&gt;[4:34:46 PM] Mike Nash says: No, I can&#39;t really help you&lt;br /&gt;[4:34:52 PM] Mike Nash says: you&#39;re committing a crime&lt;br /&gt;[4:35:03 PM] Mr. Robert Dutu says: i know&lt;br /&gt;[4:35:11 PM] Mr. Robert Dutu says: and i accept the fact that i am GUILTY&lt;br /&gt;[4:35:32 PM] Mike Nash says: But you still won&#39;t tell me how much you make :)  I&#39;ll bet your computer is more powerful than mine&lt;br /&gt;[4:35:41 PM] Mr. Robert Dutu says: and will not hesitate to be prosecuted when the law catch up with me&lt;br /&gt;[4:36:17 PM] Mr. Robert Dutu says: there is no specific amount&lt;br /&gt;[4:36:33 PM] Mr. Robert Dutu says: i take whatever you can give me&lt;br /&gt;[4:36:58 PM] Mr. Robert Dutu says: even if is 100 or 50 $&lt;br /&gt;[4:37:04 PM] Mr. Robert Dutu says: i will seriously appreciate it&lt;br /&gt;[4:38:06 PM] Mr. Robert Dutu says: and i know my God will forgive because i pray to him to replenish the pockets of my clients with double of whatever they loss&lt;br /&gt;&lt;br /&gt;At this point, he went all religion on me and talked about washing his sins and so on.   Then back to business:&lt;br /&gt;&lt;br /&gt;[4:44:16 PM] Mr. Robert Dutu says: i take whatever you can give me&lt;br /&gt;[4:44:23 PM] Mr. Robert Dutu says: even if is 100 or 50 $&lt;br /&gt;[4:44:33 PM] Mr. Robert Dutu says: or more&lt;br /&gt;[4:44:35 PM] Mr. Robert Dutu says: i will seriously appreciate it&lt;br /&gt;[4:45:27 PM] Mike Nash says: I&#39;ll bet you will&lt;br /&gt;[4:45:38 PM] Mike Nash says: I have this image in my head, of you in the bar after with all your friends&lt;br /&gt;[4:45:52 PM] Mike Nash says: &quot;This guy thought he was clever, but I still got him to send me $100.   Who wants a cigar?&quot;&lt;br /&gt;&lt;br /&gt;[4:46:52 PM] Mr. Robert Dutu says: (rofl)&lt;br /&gt;[4:46:56 PM] Mr. Robert Dutu says: very funny&lt;br /&gt;[4:47:01 PM] Mr. Robert Dutu says: i don&#39;t smoke&lt;br /&gt;[4:47:10 PM] Mr. Robert Dutu says: i only drink ocassionally&lt;br /&gt;&lt;br /&gt;More talking about money, and then:&lt;br /&gt;&lt;br /&gt;[4:49:31 PM] Mr. Robert Dutu says: i know at the end of this conversation you will publish our chat&lt;br /&gt;[4:49:40 PM] Mr. Robert Dutu says: but that is not a problem&lt;br /&gt;[4:49:46 PM] Mr. Robert Dutu says: i am still very sincere&lt;br /&gt;[4:49:55 PM] Mike Nash says: Actually, I published already just the funny part&lt;br /&gt;&lt;br /&gt;[4:51:53 PM] Mr. Robert Dutu says: why?&lt;br /&gt;[4:52:15 PM] Mike Nash says: because usually, if I say something like that, they do not reply and move to next victim.  It was different&lt;br /&gt;[4:52:33 PM] Mike Nash says: It is like a policeman warning a car thief to drive carefully&lt;br /&gt;[4:52:46 PM] Mr. Robert Dutu says: ahahahhahaha&lt;br /&gt;&lt;br /&gt;It was getting late, and I was ready to go home...  this is where he came up with his classic:&lt;br /&gt;&lt;br /&gt;[4:54:17 PM] Mr. Robert Dutu says:  how do i get you to send me some money?&lt;br /&gt;[4:54:40 PM] Mike Nash says: Unfortunately, you will not get me to send you money.&lt;br /&gt;&lt;br /&gt;[4:54:58 PM] Mr. Robert Dutu says: don&#39;t be stinge my friend&lt;br /&gt;[4:55:20 PM] Mr. Robert Dutu says: it will not cost you anything to send some money to a stranger who is in need&lt;br /&gt;&lt;br /&gt;[4:55:41 PM] Mike Nash says: You probably make more money than me.   Will you send me some?&lt;br /&gt;[4:56:18 PM] Mr. Robert Dutu says: &lt;span style=&quot;font-weight: bold;&quot;&gt;yes $16million usd but we will have to finance the transfer together&lt;/span&gt;&lt;br /&gt;[4:56:27 PM] Mike Nash says: HAHAHAHAHAHAHAHAHA!&lt;br /&gt;[4:56:39 PM] Mr. Robert Dutu says: yes&lt;br /&gt;[4:56:44 PM] Mike Nash says: Touche!&lt;br /&gt;[4:56:51 PM] Mr. Robert Dutu says: and we share it at the end 50% each&lt;br /&gt;[4:57:12 PM] Mr. Robert Dutu says: $8million usd for you&lt;br /&gt;[4:57:31 PM] Mr. Robert Dutu says: this is a life time opportunity&lt;br /&gt;&lt;br /&gt;[4:57:33 PM] Mike Nash says: You know, if you ever give up the scam business, you&#39;d have a great career in comedy&lt;br /&gt;[4:57:53 PM] Mr. Robert Dutu says: if i were you i will grab opportunities like this with both hands&lt;br /&gt;[4:58:02 PM] Mr. Robert Dutu says: and become rich overnight&lt;br /&gt;[4:58:28 PM] Mike Nash says: but we already know it is a scam, and you hate to do it&lt;br /&gt;[4:58:30 PM] Mr. Robert Dutu says: look my friend am not a scammer&lt;br /&gt;[4:58:32 PM] Mike Nash says: I havent been drinking&lt;br /&gt;[4:58:42 PM] Mike Nash says: so I am not likely to change my mind&lt;br /&gt;[4:58:55 PM] Mr. Robert Dutu says: ;(&lt;br /&gt;&lt;br /&gt;Unfortunately, after this gem he pretty much went back to trying to phish me with the $16 million.   A shame.  I really enjoyed the chat with him (some parts have been edited out for length) - and at some point when he was telling me about life over there (wherever there actually was) I felt sorry for him - he was very, very good at his job and had a good sense of humour about him.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Mike&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Subscribe in a reader&lt;/a&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/6148703442564441031'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/6148703442564441031'/><link rel='alternate' type='text/html' href='http://onlinearmorpersonalfirewall.blogspot.com/2009/03/yes-16million-usd-but-we-will-have-to.html' title='Phishing Scammer tries it on with CEO of an Anti-phishing software product “Online Armor”'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjygFprawyn8IxyhNBQLt2MMPtcliBiaNn8mBcKj5mSYdWyAnmjeRjkEST_9oiFs3Al0WdhENyvgzws6R2EeGfrjssIOdAHpqG1vPIk3RCCQV03TSBJs9e9aqliUVMwk4iYnLLX-FySkoP1/s72-c/wow2.JPG" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-3682883957791226401.post-6160356933659863145</id><published>2009-03-22T20:22:00.000+11:00</published><updated>2009-03-22T20:45:37.190+11:00</updated><title type='text'>Eating our own dogfood: Shopping cart updated</title><content type='html'>&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;We&#39;ve replaced our shopping cart&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;As part of rolling out &lt;a href=&quot;http://www.tallemucrm.com/&quot;&gt;Tall Emu CRM&lt;/a&gt; internally, we&#39;ve deployed the shopping cart component to the Online Armor website.   It&#39;s been live for about a week and a bit now, and is proving a lot more reliable than the original one (which we knocked off in a couple of days before Online Armor launched).&lt;br /&gt;&lt;br /&gt;For a start, our family pack systems before were pretty incomprehensible and we found a lot of people would go through the shopping cart just to figure out what it costs.  Now, we can list our products easily - in different variations, and different licence durations so people can compare.&lt;br /&gt;&lt;br /&gt;We&#39;re also able to deliver other products inside the cart as well - where previously, it was only Online Armor.  So we can do things like the admuncher and a-Squared bundles with ease.&lt;br /&gt;&lt;br /&gt;Lastly - and most excitingly - when we finish rolling out CRM internally (we have a few customer jobs to complete first) - the cart and the CRM will be linked and synched in real time.  It means we&#39;ll have &quot;one view&quot; of our customers, and the interactions with them.&lt;br /&gt;&lt;br /&gt;We&#39;re excited.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Subscribe in a reader&lt;/a&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/6160356933659863145'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/6160356933659863145'/><link rel='alternate' type='text/html' href='http://onlinearmorpersonalfirewall.blogspot.com/2009/03/eating-our-own-dogfood-shopping-cart.html' title='Eating our own dogfood: Shopping cart updated'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3682883957791226401.post-1487430210418040791</id><published>2009-03-20T14:56:00.000+11:00</published><updated>2009-03-20T15:36:15.488+11:00</updated><title type='text'>Don&#39;t be that idiot...</title><content type='html'>So, I&#39;m sitting there today working on something for a client when I received &lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjygFprawyn8IxyhNBQLt2MMPtcliBiaNn8mBcKj5mSYdWyAnmjeRjkEST_9oiFs3Al0WdhENyvgzws6R2EeGfrjssIOdAHpqG1vPIk3RCCQV03TSBJs9e9aqliUVMwk4iYnLLX-FySkoP1/s1600-h/wow2.JPG&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 285px; height: 400px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjygFprawyn8IxyhNBQLt2MMPtcliBiaNn8mBcKj5mSYdWyAnmjeRjkEST_9oiFs3Al0WdhENyvgzws6R2EeGfrjssIOdAHpqG1vPIk3RCCQV03TSBJs9e9aqliUVMwk4iYnLLX-FySkoP1/s400/wow2.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5315113982600679634&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;an unsolicted Skype Message with an &quot;Important Business Proposal&quot;.&lt;br /&gt;&lt;br /&gt;I normally mess with these guys a little, just to waste their time , but as I was on the phone to a client I just decided to get rid of him quickly.&lt;br /&gt;&lt;br /&gt;As you can see - he was suprisingly honest about his ultimate intentions.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;This is how the scam works&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Mr Dutu, or Mrs Dutu is usually writing to you from a yahoo or other free email address. It usually doesn&#39;t address you by name.  It always offers some opportunity - usually, the chance to get a share of millions of dollars in exchange for some assistance.&lt;br /&gt;&lt;br /&gt;A common theme is the widow of a Nigerian official (or just a corrupt Nigerian official) wants to move $250M (usually spelled as TWO HUNDRED AND FIFTY MILLION DOLLARS) out of the country.  He or she just needs a partner overseas.&lt;br /&gt;&lt;br /&gt;They offer a split of the money. Often there is the chance of further profits (we&#39;d like to invest in real-estate in your country, and we will give you 10% of the profits).   Quite often, they thank God for His mercy in finding someone as kind as yourself to help them.&lt;br /&gt;&lt;br /&gt;So, you&#39;re probably asking yourself - how does this scam work?  They want to send you  $250M - it&#39;s going to your bank account - what&#39;s the catch?    This scam has been going on for years, and it&#39;s called Advanced Fee Fraud.&lt;br /&gt;&lt;br /&gt;Had I accepted this guy&#39;s offer, here&#39;s what likely would have happened:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;He&#39;d ask me for some ID - passport and bank account details for the money&lt;/li&gt;&lt;li&gt;He&#39;s send me some official looking documentation - fake of course - which would allow me to claim the money from some third party.  The third party would probably also have a free email address too (like Yahoo or Hotmail).&lt;/li&gt;&lt;li&gt;The third party (Notary, Bank Manager) would contact me about claiming my money - and here&#39;s the catch - there&#39;s a $20 fee for stamping the document.  Or a $200 fee.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Mr Dutu would claim not to have this money, but of course, since I will soon get 10% of $250M,  $200 is not much to pay.&lt;/li&gt;&lt;li&gt;I&#39;d send the money - and the documents would be &quot;stamped&quot;.&lt;/li&gt;&lt;li&gt;Once they&#39;d got me for $200 - there would be some other issue... and the costs would keep rising and rising until they couldn&#39;t get any more money out of me.&lt;/li&gt;&lt;/ul&gt;It&#39;s a sad fact that in tough economic times, people get desparate and take risks or chances that they wouldn&#39;t normally take in the hope of the &quot;one big win&quot; that would solve all their problems.  You can imagine being in dire straights, and having invested $2,000 or so , thinking another $500 can&#39;t hurt.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Don&#39;t get caught out.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;I&#39;ve told the guy to go and find an idiot.  Don&#39;t let it be you - seriously - if it looks too good to be true, it probably is.  The chance that some corrupt official is going to send you $250M dollars and let you keep 10% of it is pretty remote to say the least.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Subscribe in a reader&lt;/a&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/1487430210418040791'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/1487430210418040791'/><link rel='alternate' type='text/html' href='http://onlinearmorpersonalfirewall.blogspot.com/2009/03/dont-be-that-idiot.html' title='Don&#39;t be that idiot...'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjygFprawyn8IxyhNBQLt2MMPtcliBiaNn8mBcKj5mSYdWyAnmjeRjkEST_9oiFs3Al0WdhENyvgzws6R2EeGfrjssIOdAHpqG1vPIk3RCCQV03TSBJs9e9aqliUVMwk4iYnLLX-FySkoP1/s72-c/wow2.JPG" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-3682883957791226401.post-5334796355005033451</id><published>2009-03-17T23:01:00.000+11:00</published><updated>2009-03-17T23:35:57.181+11:00</updated><title type='text'>A Host of Problems</title><content type='html'>Let&#39;s talk about the HOSTS file.  It&#39;s a topic that causes all kind of confusion for Online Armor users, especially when they&#39;re running other software such as Spybot which writes entries into the hosts file because it&#39;s such a technical topic.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Let&#39;s take a step back in history&lt;/span&gt;...&lt;br /&gt;&lt;br /&gt;Once upon a time in the early days of the internet - before it was the internet, there was no such thing as DNS.  It was called ARPANET - and the way you&#39;d map from a human readable name like &quot;computer2&quot; to an IP address like &quot;192.168.0.51&quot; was to write an entry in the HOSTS file on each computer, like this:&lt;br /&gt;&lt;br /&gt;192.168.0.51    computer2&lt;br /&gt;&lt;br /&gt;You&#39;d write that entry on all 6 computers that made up the internet, and life was good, you could find things easily.   Just type &quot;Computer2&quot; and the computer would look in the hosts file, and think &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;Aha, this pathetic human cannot remember 6 IP addresses - it wants to connect to 192.168.0.51&lt;/span&gt;&quot;&lt;br /&gt;&lt;br /&gt;Of course, there are a lot more than 6 computers on the internet now - so a new system was born - the DNS - which did the same sort of thing, but without having to copy and paste 400 million entries into the hosts files on 400 million computers.   A lot more convenient.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Programmers, Network admins and the hosts file&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Although the hosts file was mostly made extinct by the DNS system, certain folks still used it - mostly for practical jokes, or testing websites.   For example, if I were working on a new version of the site &quot;www.tallemu.com&quot; then I could write an entry in the hosts file on my computer, and tell it to send requests for www.tallemu.com to my test server , not to the live server. &lt;br /&gt;&lt;br /&gt;This meant that it would be easy to test new versions working as they should, without inconveniencing everyone on the internet.    It also meant that you could play tricks on your colleagues by messing with their hosts file - redirecting them to fake sites you&#39;d made running on the company webserver, so when they went to their favorite timewasting site, it would redirect it to a site under your control which would tell them to get back to work.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Bad things start to happen&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;There&#39;s a special address called the loopback address - 127.0.0.1 - what it means on any computer is basically &quot;Me!!&quot;  - so, if I was running a webserver on my laptop to test sites I was developing, I could again write an entry in my HOSTS file and say that tallemu.com should go to 127.0.0.1 - which would mean my laptop.  Again, I can use this to test.&lt;br /&gt;&lt;br /&gt;Of course - most people don&#39;t run a webserver on their laptop. It would be crazy.  In that situation, what happens to traffic that you redirect to 127.0.0.1 ?    It just times out, and goes nowhere.&lt;br /&gt;&lt;br /&gt;Malware writers know this - and if they write the domain names of your antivirus company into the hosts file, they can either redirect you to a server that they control - or - redirect it to your local, webserverless computer - in effect blocking the site.   Naughty.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;The good guys got onto this trick too.&lt;/span&gt; Of course, being good guys, they started to write lists of dangerous sites and point them to 127.0.0.1 - making them inaccessible if you accidentally went to that site, or went to a website that had references to those sites.  In other words:&lt;br /&gt;&lt;br /&gt;www.NeverGoHere.com   127.0.0.1  &lt;br /&gt;&lt;br /&gt;in your hosts file would usually mean you would never get to visit   www.nevergohere.com - so it&#39;s a quick and dirty way of blocking a site.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Confusion Reigns!&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;This is where it gets confusing.  When we released Online Armor, we were very worried about malware re-directing our users to fake banking sites using the hosts files, or by writing entries in the hosts file that were designed to deny people access to the sites that they wanted to visit, such as Antivirus companies.&lt;br /&gt;&lt;br /&gt;To stop these attacks, we designed a nice system that controlled which entries are allowed to exist in the HOSTS file.   The idea was simple - we&#39;d pop up a warning that said words to the effect of &quot;Hey! Something is trying to mess with your hosts file!&quot;  -  if you let it make the modification it would be &lt;span style=&quot;font-weight: bold;&quot;&gt;allowed&lt;/span&gt; and if you didn&#39;t, it would be &lt;span style=&quot;font-weight: bold;&quot;&gt;blocked&lt;/span&gt; and automatically prevented from happening again.   The idea - if a bad guy wanted to write www.yourbank.com into the hosts file to trick you, you could say &quot;Block&quot; and it could never appear in the hosts file.&lt;br /&gt;&lt;br /&gt;Makes perfect sense, right ?&lt;br /&gt;&lt;br /&gt;Unfortunately, what messes this up for everyone is that the good guys and the bad guys are using the same trick.   So,&lt;br /&gt;&lt;br /&gt;1) Your Anti-Spyware program writes www.nastysite.com into the HOSTS file with 127.0.0.1  - this would prevent your computer connecting to it.  &lt;br /&gt;&lt;br /&gt;2) Online Armor sees this and says &quot;Hey, this is trying to update the hostsfile man, you sure you wanna do that ?&quot;   - and of course, you trust your Anti-Spyware program so you allow it.&lt;br /&gt;&lt;br /&gt;This then leads to the bizarre status of you having an entry in Online Armor for a bad site (pointing to 127.0.0.1) which is &lt;span style=&quot;font-weight: bold;&quot;&gt;allowed.    &lt;/span&gt;And that status being perfectly correct and safe.&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;What it actually means is that the entry is allowed to exist in the hosts file&lt;span style=&quot;font-weight: bold;&quot;&gt;.  &lt;/span&gt;The hosts file entry then does what it does.&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;I&#39;m almost confused myself.  We&#39;ll be trying to find a way to make this more understandable in future releases of Online Armor.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Subscribe in a reader&lt;/a&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/5334796355005033451'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/5334796355005033451'/><link rel='alternate' type='text/html' href='http://onlinearmorpersonalfirewall.blogspot.com/2009/03/host-of-problems.html' title='A Host of Problems'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3682883957791226401.post-6491785763401822189</id><published>2009-03-02T23:18:00.000+11:00</published><updated>2009-03-14T21:22:26.768+11:00</updated><title type='text'>The Good, The Bad, and the Unknown</title><content type='html'>A lot of people ask me questions about the whitelist that is used in Online Armor.  Why do we have one?  What is it for?    So, the main purpose of this post is really to talk about whitelists - and how we&#39;re using them in Online Armor.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;A quick recap on classifying files&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Online Armor in its out of the box setup will prompt you when programs it doesn&#39;t recognize try to run.  The reason for this is straightforward - if a program doesn&#39;t run, it can&#39;t do your computer any harm.  So, a key defensive strategy in Online Armor is to prevent dangerous programs from even starting.&lt;br /&gt;&lt;br /&gt;Unforunately, &lt;span style=&quot;font-weight: bold;&quot;&gt;it&#39;s extremely difficult to maintain a list of all of the dangerous programs&lt;/span&gt; in the world.  The authors try hard to make them get past Antivirus vendors, and they certainly don&#39;t announce the release of them so that they can be included in a backlist. &lt;br /&gt;&lt;br /&gt;Instead, they sneak them into circulation and try to get the spread to happen before the Antivirus vendors notice.  To combat this, the AV Vendors added heuristic detection - which is basically checking &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;If it looks like a duck, quacks like a duck, call it a duck&lt;/span&gt;&quot;.&lt;br /&gt;&lt;br /&gt;It&#39;s an interesting problem - Antivirus basically classifies files into a couple of groups:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Group 1&lt;/span&gt;: A solid detection - The Donald Ducks of the Antivirus world. A known virus.&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Group 2&lt;/span&gt;: Heuristic Detection - it&#39;s quacking, and it has a beak... it&#39;s certainly ducklike.&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Group 3&lt;/span&gt;: No ducklike behaviour reported.&lt;br /&gt;&lt;br /&gt;The first two groups are are detected and either flagged, blocked, quarantined as bad, or dangerous files (or, in some cases, there&#39;s a &quot;possibly unwanted&quot; category).  The third group is just allowed to run.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;The Third Group is allowed to run. &lt;/span&gt;This is important.  If the antivirus doesn&#39;t know(or suspect) that the file is bad, it allows it to run.  If it *is* bad, well, oops, you just got infected.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Online Armor treats programs differently.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Group 1&lt;/span&gt;: A solid detection - This file is bad.&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Group 2&lt;/span&gt;: A solid detection - This file is Safe.&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Group 3&lt;/span&gt;: Not on the list - we haven&#39;t a clue.&lt;br /&gt;&lt;br /&gt;So, &lt;span style=&quot;font-weight: bold;&quot;&gt;group 1&lt;/span&gt; files are either on Online Armor&#39;s blacklist, detected by Online Armor AV+&#39;s embedded AV (soon to be the dual engine from Emsisoft/Ikarus).    &lt;span style=&quot;font-weight: bold;&quot;&gt;Group 2&lt;/span&gt; files are files we know are safe, and therefore don&#39;t get a prompt.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Group 3&lt;/span&gt; files - we don&#39;t know.  In this case, we ask the user for a decision, which results in popup to ask them what to do.&lt;br /&gt;&lt;br /&gt;In fact - inside Online Armor we technically have 4 states of file:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Blocked &lt;/span&gt;- just about what you&#39;d expect&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Unknown &lt;/span&gt;- no decision has yet been made&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Allowed &lt;/span&gt;- the program is allowed to run, but you will be prompted for other actions&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Trusted &lt;/span&gt;- the program is allowed to do whatever it wants.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Back on topic..&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;So - if you read the above, then it&#39;s pretty clear that the way Online Armor treats files is more secure - unknown programs are not blindly allowed to run - but this is at the expense of more work for the user.   In the event we didn&#39;t have a whitelist at all, Online Armor would be constantly popping up for every program on your computer.&lt;br /&gt;&lt;br /&gt;So, the whitelist is important to reduce popups.  People who don&#39;t like the whitelists idea say that there is a key problem: &lt;span style=&quot;font-weight: bold;&quot;&gt;It&#39;s impossible to whitelist all programs&lt;/span&gt;, there are just too many of them.&lt;br /&gt;&lt;br /&gt;Of course, they&#39;re right - it *is* impossible to whitelist everything - but we don&#39;t have to.  Each program that we whitelist is potentially one less popup not just for one user, but for millions of users - so cumulatively, our users get a benefit.&lt;br /&gt;&lt;br /&gt;My second argument - suppose that we can reduce popups by 10%.  Is it worth doing?   What if we can reduce them by 12% or 15% or even 50% ?    At what point does a whitelist start to make sense?&lt;br /&gt;&lt;br /&gt;From my point of view, if we manage to whitelist the top 10% of programs then our users will get 10% less popups, and I think that&#39;s worth having.  The bigger this number, the better.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;There will always be programs that don&#39;t make the whitelist&lt;/span&gt;.  Common programs, unusual programs. It doesn&#39;t matter.   The goal is simply to get as many as we can.&lt;br /&gt;&lt;br /&gt;When I install Online Armor on my computer, I get just a few entries to check in autoruns (some specialised software we wrote for a customer) and 10 or so entries in programs to check (same sort of thing).    This is much better than what I had several months ago, where I had at least 40 or 50 items to check in programs... and even though I still have 10, it makes Online Armor much easier to use.&lt;br /&gt;&lt;br /&gt;For our upcoming v3.5 release, we&#39;ve spent a lot of time in the background reworking our OASIS infrastructure to faster process inbound data and classify files so we can improve our whitelist.   We should see the results of this over the coming months.&lt;br /&gt;&lt;br /&gt;We&#39;ve also added a realtime lookup of newly created files - to try and get this data out to the user&#39;s computer as quickly as possible.   It&#39;s going to be very interesting to see, once released, how low we can go with popups.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Subscribe in a reader&lt;/a&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/6491785763401822189'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/6491785763401822189'/><link rel='alternate' type='text/html' href='http://onlinearmorpersonalfirewall.blogspot.com/2009/03/good-bad-and-unknown.html' title='The Good, The Bad, and the Unknown'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3682883957791226401.post-5117128151626146485</id><published>2009-02-24T16:25:00.001+11:00</published><updated>2009-02-24T21:38:05.153+11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="do you need hardware and software firewall?"/><category scheme="http://www.blogger.com/atom/ns#" term="hardware firewall"/><category scheme="http://www.blogger.com/atom/ns#" term="software firewall"/><title type='text'>Do you need both a physical firewall and a software firewall?</title><content type='html'>&lt;span style=&quot;;font-family:arial;font-size:100%;&quot;  &gt;This question is quite often asked over at our forums - &quot;Do I need a physical firewall and a software firewall?&quot;  and it&#39;s variation - &quot;Since I use Online Armor, do I need to worry about my hardware based firewall?&quot;.&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;  &lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;;font-family:arial;font-size:130%;&quot;  &gt;A &lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:arial;font-size:130%;&quot;  &gt;HARDWARE &lt;/span&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;firewall is a separate physical device from your computer.    &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Your Cable or DSL plugs in one side, and you have a couple of sockets there that you can connect up multiple computers to.   If you splashed out an extra couple of dollars, you got an antenna attached as well to enable your wireless network.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;If you have one of these beasties, you&#39;re already behind a firewall of some kind - and you will also be NAT&#39;d.    NAT means &quot;Network Address Translation&quot; - and for our purposes here, it means that your router/firewall has your PUBLIC IP address - and all of the computers behind it have PRIVATE IP Addresses.&lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;&lt;br /&gt;&lt;br /&gt;What this gives you is quite simple - if I try to connect to your public IP address, it will stop at your router/firewall unless there is some rule allowing it through (and redirecting it to a computer on the inside) or, in case the data is coming back in response to a connection you opened.  After all, if you had to open ports on your firewall to get back the web pages you just told your browser to load, the internet would get really hard to use.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Just by being NAT&#39;d and not having ports open, you&#39;re getting a measure of security because the bad guys on the outside can&#39;t connect to your computer and read your shopping list.  &lt;/span&gt;  &lt;span style=&quot;font-family:arial;&quot;&gt;I think most people these days (unless they are on dialup) have a hardware firewall of some type.  They&#39;re cool, and they&#39;re useful - they&#39;re always on - and they easily allow you to connect up multiple computers together in  a home network.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Now - let&#39;s take our bad guy - hollywood version.  Ruggedly good looking, and up against time he jumps onto the internet - maybe he uses some cool (and completely impractical) 3D user interface involving bricks.   Maybe , he&#39;s furiously typing 3 letters and watching old BASIC programs scroll past - but he&#39;s hacking.... (and probably has a cool scar).  It works.   He gets into the computer and gets the data/location of hero/missile control codes.    Now the good guys have their work cut out for them.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Back to real life.  In real life however your home computer is more at risk from things that you do.  Certainly, you have your hardware firewall which will defeat inbound automated scans trying to take over your computer - but unfortunately, data gets on to your computer in a number of ways: &lt;/span&gt;&lt;/span&gt;&lt;ul  style=&quot;font-family:arial;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;You go to a web site&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;You download a program&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;You receive email&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;You use P2P programs or other file sharing tools to download&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; &lt;span style=&quot;font-family:arial;&quot;&gt;Hackers are sneaky little devils, and motivated these days by money. Their objective is to get your computer and have it work for them - because computers are expensive, so why buy one if you can hijack millions of them.&lt;br /&gt;&lt;br /&gt;They&#39;ll use any tricks that they can think of to get their program on to your computer.   At one end, the program might install toolbars or advertising programs so they get a few cents per click.   It might be a keylogger to record (and transmit your keystrokes - especially those that relate to your bank username and password).   Your computer could be used as part of a co-ordinated attack to bring someone&#39;s website down - for money.&lt;br /&gt;&lt;br /&gt;So, if the hackers get this program on to your computer, at some point it&#39;s likely to want to connect out to the big bad world.  &lt;/span&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;And what does your hardware firewall do?  Nothing.&lt;/span&gt; &lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Enter the &lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Software Firewall&lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The software firewall is a program , not a piece of hardware - and it sits on your computer and acts like a traffic cop.  Can this program connect?  Can that program send data?   This program wants to let other computers connect to it.&lt;br /&gt;&lt;br /&gt;There are various reasons why computers need to talk to each other - loneliness, romance, sharing printers or files - these are all legit reasons.&lt;br /&gt;&lt;br /&gt;With a software firewall, if our hypothetical bad guys get a program on your computer your software firewall should see it - and, it should squeal like an 8 year old girl.  (Actually, in an ideal situation, the squealing should only happen in case the program is bad, or unknown - but we&#39;ll leave that alone for another day).&lt;br /&gt;&lt;br /&gt;So - the software firewall primarily is used to control outbound traffic.  Because it runs on the computer itself, it can identify which programs are trying to connect to the outside world, where, and so on.   Then you need to use a bit of the old grey matter (or google) to figure out if it should be allowed.&lt;br /&gt;&lt;br /&gt;The idea is simple: Software firewall stops bad guys from sneaking data off (and, in as well - though we&#39;re assuming your hardware beast already caught it).&lt;br /&gt;&lt;br /&gt;There are further complexities that I won&#39;t go into now - like programs that try to trick your firewall, or you. Programs that try to bypass it to get the data out - good firewalls will protect against this to some degree.&lt;br /&gt;&lt;br /&gt;But - now it comes to the answer to the question....&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&quot;Do I need a physical firewall and a software firewall?&quot;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;My answer would be a straightforward yes.  A physical firewall is cheap, and effective.  It will keep a lot of junk out - and it gives you an easy way to share your internet connection.&lt;br /&gt;&lt;br /&gt;If you have a physical firewall and a software firewall, you should run them both.  After all, if you had two locks on a door would you just choose one of them?  People have deadbolts for a reason.&lt;br /&gt;&lt;br /&gt;And the last one - do I need a software firewall at all?   Well, we wouldn&#39;t have spent years writing Online Armor if we thought you didn&#39;t :)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Mike&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Subscribe in a reader&lt;/a&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/5117128151626146485'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/5117128151626146485'/><link rel='alternate' type='text/html' href='http://onlinearmorpersonalfirewall.blogspot.com/2009/02/do-you-need-both-physical-firewall-and.html' title='Do you need both a physical firewall and a software firewall?'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3682883957791226401.post-7201262156995096795</id><published>2008-04-15T18:07:00.000+10:00</published><updated>2008-04-15T18:18:54.273+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="best personal firewall software"/><category scheme="http://www.blogger.com/atom/ns#" term="firewall testing"/><category scheme="http://www.blogger.com/atom/ns#" term="free software"/><category scheme="http://www.blogger.com/atom/ns#" term="grc.com"/><category scheme="http://www.blogger.com/atom/ns#" term="new release 2.1.0.130"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="online armor"/><category scheme="http://www.blogger.com/atom/ns#" term="runs safer"/><category scheme="http://www.blogger.com/atom/ns#" term="secure browser"/><category scheme="http://www.blogger.com/atom/ns#" term="shieldsup"/><category scheme="http://www.blogger.com/atom/ns#" term="tall emu"/><title type='text'>Online Armor&#39;s NEW release has a wicked new feature</title><content type='html'>&lt;span style=&quot;font-weight: bold;&quot;&gt;Run Safer Goes GREEN!&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Lets just talk about one of the new features of Online Armor (free and paid) - the green border around apps that are currently running in &quot;Safer&quot; mode.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Try this for a test:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;1) Download a file from a browser you are running &quot;Safer&quot; and launch it from the browser. You will see, because the process was created by the browser (with lowered rights) that this program inherits the green bordering - a nice indication that the program is also running in &quot;Safer&quot; mode.&lt;br /&gt;&lt;br /&gt;If you save the file from the browser, and then manually open it with a double click - it will run &quot;Normal&quot;.&lt;br /&gt;&lt;br /&gt;This may cause some new users to complain that when they download a desired file, it cannot install because of a permissions issue - BUT if this were a drive by, it would not be able to (for example) write to windows, the root of the drive, or program files directory.&lt;br /&gt;&lt;br /&gt;This is a really cool feature (runsafer itself did not change, just the visualisation of it) - but the bordering/indication really makes it clear what&#39;s happening. I thought about not including the bordering in the free version - but it&#39;s just too cool not to make it available for everyone.&lt;br /&gt;&lt;br /&gt;2) Set your Outlook/Outlook Express/EmailClientOfChoice to run-safer. Restart it so you see the border (indicating protection). Now, if you have an email with an attachment (PDF, whatever) - double click it from inside the mail client.&lt;br /&gt;&lt;br /&gt;What you should see is that (in the pdf example) acrobat cranks up as you&#39;d expect (or foxit ) - with your document - and again, with a nice green border around it.&lt;br /&gt;&lt;br /&gt;Do the same with your IM clients - except for when you want to update them - and you have a nice, easy and visible layer of protection that really works across several key infection points. You can also run MS Word, MS Excel as safer as well with ease. (On my system I&#39;m running Outlook, my chat clients and web browsers (FF and IE) in safer mode now)&lt;br /&gt;&lt;br /&gt;With the addition of this visualisation - run safer is now firmly my favorite OA feature. You could experiment further with changing some other settings (for example: turn off prompts in webshield, turn off prompt on unknown and auto-allow trusted to connect to the net to off as well) and you&#39;d probably get fairly few popups - with runsafer doing the heavy lifting in terms of protecting you against accidental clickage.&lt;br /&gt;&lt;br /&gt;I thought I would take the time to highlight one of it&#39;s most overlooked features (and , IMHO one of the coolest)&lt;br /&gt;&lt;br /&gt;Mike&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border: 0pt none ;&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Subscribe in a reader&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Subscribe in a reader&lt;/a&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/7201262156995096795'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/7201262156995096795'/><link rel='alternate' type='text/html' href='http://onlinearmorpersonalfirewall.blogspot.com/2008/04/online-armors-new-release-has-wicked.html' title='Online Armor&#39;s NEW release has a wicked new feature'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3682883957791226401.post-7251209726543142644</id><published>2008-04-10T11:55:00.000+10:00</published><updated>2008-04-09T16:43:10.090+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="best personal firewall software"/><category scheme="http://www.blogger.com/atom/ns#" term="firewall testing"/><category scheme="http://www.blogger.com/atom/ns#" term="free software"/><category scheme="http://www.blogger.com/atom/ns#" term="grc.com"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="online armor"/><category scheme="http://www.blogger.com/atom/ns#" term="shieldsup"/><category scheme="http://www.blogger.com/atom/ns#" term="tall emu"/><title type='text'>What is the Shields Up Test?</title><content type='html'>&lt;span style=&quot;font-size:130%;&quot;&gt;Many firewall users put a good deal of emphasis on the Shields UP test over at grc.com.   The purpose of this test is to check your firewall remotely to see what&#39;s open, or visible.   Many modern firewalls, including Online Armor pass these tests - if the test is performed properly. &lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;    &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;The problem is that nowadays many computers are behind modems, routers or even hardware firewalls making it very difficult, or impossible to test.&lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;    &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;&quot;&gt;How does the test work?&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Putting it simply, when you run the test the shields-up server will start to fire data at your computer.  So, the data comes out of the ShieldsUP server, whizzes it&#39;s way over the internet, undersea cables, fiber, you name it. It gets to your ISP... whizzes through their systems, and out another pipe towards your home.  Once it gets to your home, it squirts through your modem or router and into your PC.  Once it&#39;s on your PC, it&#39;s up to the firewall to deal with it.   If it sends back ANY response at all - it&#39;s a fail.   &lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;    &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;&quot;&gt;So why does my software firewall fail?&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Before we start talking about software firewalls failing, how do you know the data is even reaching your software firewall?  Remember above where we talked about the pathway that the packets take?  There&#39;s the problem. If you have a router, or a modem  - or your ISP does anything tricky - or, if you are plugged into someone&#39;s wirless network in a hotel, the packets may not actually reach your computer. &lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;The animation below shows the ShieldsUP test in action.   The first one shows a normal test, working the way the SheildsUP guys intended, reacting against a computer connected to the internet, but in all it&#39;s stealthy glory.&lt;br /&gt;&lt;div align=&quot;left&quot;&gt;&lt;br /&gt;&lt;embed src=&quot;http://support.tallemu.com/images/OA_Flash_V2.swf&quot; quality=&quot;high&quot; pluginspage=&quot;http://www.macromedia.com/go/getflashplayer&quot; type=&quot;application/x-shockwave-flash&quot; width=&quot;480&quot; height=&quot;180&quot;&gt;&lt;/embed&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;anim 1=&quot;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/anim&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxZ_P1ksjSfUwIw0at8BI-wWWTWaXhMBE2sOvgL5rqTOluXuJAFx3B-egmiHiMHhIttNRY-wqPrSDnhST5DMLxmGRPIUqmwR2-Lw5hA-c9u-eHQ8qtUMCsIhCkllr3IJiCStKNHybotMF2/s1600-h/imageOfAnimation.gif&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;The second animation shows a firewall that sends something back.  That&#39;s a straight fail in ShieldsUp talk.... bad firewall, go to the back of the class.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;embed src=&quot;http://support.tallemu.com/images/OA_Flash_2_V2.swf&quot; quality=&quot;high&quot; pluginspage=&quot;http://www.macromedia.com/go/getflashplayer&quot; type=&quot;application/x-shockwave-flash&quot; height=&quot;180&quot; width=&quot;480&quot;&gt;&lt;/embed&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;anim 2=&quot;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/anim&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;The LAST animation is the interesting one.  Here, the data squirts to your PC, hits your modem which cries &quot;I&#39;m alive! I&#39;m here&quot; - this causes ShieldsUp to fail - but the data actually got nowhere near your computer at all.  It&#39;s also more interesting if you have more than one computer behind your firewall/router - because you wont necessarily know which one, if any, answered it.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;  &lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;embed src=&quot;http://support.tallemu.com/images/OA_Flash_3_V2.swf&quot; quality=&quot;high&quot; pluginspage=&quot;http://www.macromedia.com/go/getflashplayer&quot; type=&quot;application/x-shockwave-flash&quot; height=&quot;180&quot; width=&quot;480&quot;&gt;&lt;/embed&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;    &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;anim3&gt;&lt;/anim3&gt;&lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;So - what to do in this case?   You could always turn off your computer - if you still get a failure then it must be the modem.  Unfortunately - if you turn off your computer, you can&#39;t request the test :(   &lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;    &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;If GRC changed the test so you could request the test, turn off your computer - then come back and collect the results 5 minutes later, then that would work for those on a fixed IP - or, if you&#39;re a tenacious sort then you can probably figure out how to configure your modem differently to not respond to those pings. &lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;    &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Online Armor does (when properly tested) pass these tests as do many other firewalls - but the test cannot be passed (or failed) by your firewall if the data does not reach your software firewall.   Now the only remaining question is whether there is any benefit to the ShieldsUP test, other than as a quick &quot;do I have any open ports&quot;.&lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Subscribe in a reader&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://onlinearmorpersonalfirewall.blogspot.com/feeds/7251209726543142644/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3682883957791226401/7251209726543142644' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/7251209726543142644'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/7251209726543142644'/><link rel='alternate' type='text/html' href='http://onlinearmorpersonalfirewall.blogspot.com/2008/03/what-is-shields-up-test.html' title='What is the Shields Up Test?'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3682883957791226401.post-8363860785836234253</id><published>2008-04-03T10:05:00.001+11:00</published><updated>2010-09-03T22:04:30.198+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="best personal firewall software"/><category scheme="http://www.blogger.com/atom/ns#" term="firewall testing"/><category scheme="http://www.blogger.com/atom/ns#" term="free software"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="online armor"/><category scheme="http://www.blogger.com/atom/ns#" term="tall emu"/><title type='text'>Online Armor Awarded Best Firewall Software of 2008</title><content type='html'>&lt;div class=&quot;MsoNormal&quot;&gt;Online Armor has been further acclaimed as the &lt;b&gt;&quot;Best Firewall Software of 2008&quot;.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=3682883957791226401&amp;amp;postID=8363860785836234253#scotfinnie&quot;&gt;&lt;/a&gt;Scot Finnie in conjunction with over a 1000 of his readers have been reviewing and testing all the major players in the firewall category. This process started way back in the later part of 2006. &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;br /&gt;
Tall Emu are very proud of this result as it is co-reviewed by end users, takes into account third-party testing and has been ongoing for more than a year.  Plus the award is against both a firewalls security credentials and its usability. &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;Here is the final paragraph of the review taken directly from the formal review by Scot Finnie Newsletter. &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;br /&gt;
&lt;b&gt;“Online Armor 2.1.0.112 (the paid version) is the best firewall I’ve ever tested, offering a blend of usability and hard-wired security that’s near-ideal for maximizing protection and ensuring a good user experience. A great firewall doesn’t have to be, and shouldn’t be, a chore to use. Online Armor isn’t.&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;border: medium none; padding: 0cm;&quot;&gt;&lt;b&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;br /&gt;
A year and a half after launching this quest, naming OA the Best Firewall Software of 2008 came naturally. The very best products have a way of standing out.”&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;border: medium none; padding: 0cm;&quot;&gt;&lt;b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt; To view the full review you can check out &lt;a href=&quot;http://blog.scotsnewsletter.com/2008/03/24/the-best-firewall-software-of-2008-online-armor/&quot;&gt;http://blog.scotsnewsletter.com/2008/03/24/the-best-firewall-software-of-2008-online-armor/&lt;/a&gt; .&lt;/div&gt;&lt;div align=&quot;left&quot; class=&quot;MsoSubtitle&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;About Scot Finnie&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Scot Finnie has been a journalist and magazine editor for nearly 25 years. He has worked on staff at several computer magazines and online publications, including &lt;a href=&quot;http://www.computerworld.com/&quot;&gt;&lt;span style=&quot;color: black; text-decoration: none;&quot;&gt;Computerworld&lt;/span&gt;&lt;/a&gt;, where he is Editor in Chief.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;He has also served on the editorial staffs of ZDNet, PC/Computing, InformationWeek/Techweb, and Windows Magazine. He&#39;s written articles in the past for numerous other publications, including CFO, CNET, PC World, PC Magazine, MacWeek, Byte, Popular Science, and Popular Mechanics.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;a href=&quot;http://blog.scotsnewsletter.com/&quot;&gt;&lt;span style=&quot;color: black; text-decoration: none;&quot;&gt;Scot’s Newsletter&lt;/span&gt;&lt;/a&gt; is Finnie&#39;s personal blog and newsletter. It covers operating systems (primarily Windows and Macintosh), security, the Internet, and technology at large.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;border: medium none; padding: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;border: medium none; padding: 0cm;&quot;&gt;&lt;br /&gt;
&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div style=&quot;border-color: -moz-use-text-color -moz-use-text-color windowtext; border-style: none none solid; border-width: medium medium 1.5pt; padding: 0cm 0cm 1pt;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Subscribe in a reader&lt;/a&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/8363860785836234253'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/8363860785836234253'/><link rel='alternate' type='text/html' href='http://onlinearmorpersonalfirewall.blogspot.com/2008/03/online-armor-awarded-best-firewall.html' title='Online Armor Awarded Best Firewall Software of 2008'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3682883957791226401.post-5289987043222980818</id><published>2008-04-03T10:02:00.000+11:00</published><updated>2008-04-02T16:03:43.462+11:00</updated><title type='text'>Welcome to the Online Armor Blog</title><content type='html'>Hello Everyone,&lt;br /&gt;&lt;br /&gt;Welcome to the Online Armor blog.   This first post will be very short - what we plan to do here is use this blog as a place to discuss Online Armor - how to use it, computer security, and other things of interest.&lt;br /&gt;&lt;br /&gt;We&#39;re still setting things up here - so bear with us while we move in.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Mike&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Subscribe in a reader&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://onlinearmorpersonalfirewall.blogspot.com/feeds/5289987043222980818/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3682883957791226401/5289987043222980818' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/5289987043222980818'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/5289987043222980818'/><link rel='alternate' type='text/html' href='http://onlinearmorpersonalfirewall.blogspot.com/2008/03/welcome-to-online-armor-blog.html' title='Welcome to the Online Armor Blog'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3682883957791226401.post-992303058857391324</id><published>2008-04-01T15:12:00.000+11:00</published><updated>2008-04-01T15:20:41.139+11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="best personal firewall software"/><category scheme="http://www.blogger.com/atom/ns#" term="firewall testing"/><category scheme="http://www.blogger.com/atom/ns#" term="free software"/><category scheme="http://www.blogger.com/atom/ns#" term="Kaspersky"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="online armor"/><category scheme="http://www.blogger.com/atom/ns#" term="tall emu"/><title type='text'>Online Armor &amp; Tall Emu in the Press</title><content type='html'>&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: 24pt; font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;;&quot;&gt;Anti-phishing app looks for users&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;  &lt;p style=&quot;font-weight: bold;&quot; class=&quot;MsoNormal&quot;&gt;By Sam Varghese 22nd October 2004&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;A Sydney firm has developed software which can help in stopping the rash of successes enjoyed by the senders of phishing emails - only this time, the software works at the user&#39;s end.&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;a href=&quot;http://www.smh.com.au/articles/2004/10/22/1098316833867.html&quot;&gt;http://www.smh.com.au/articles/2004/10/22/1098316833867.html&lt;/a&gt;&lt;span style=&quot;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;a href=&quot;http://www.theage.com.au/articles/2004/10/22/1098316833867.html&quot;&gt;http://www.theage.com.au/articles/2004/10/22/1098316833867.html&lt;/a&gt;&lt;/p&gt;&lt;div style=&quot;border-style: none none solid; border-color: -moz-use-text-color -moz-use-text-color windowtext; border-width: medium medium 1.5pt; padding: 0cm 0cm 1pt;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;  &lt;/div&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;    &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: 24pt; font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;;&quot;&gt;Kaspersky engine integrates with Tall Emu security solution.(Security News and Products)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Source:  Software World, &lt;/span&gt;&lt;span class=&quot;articledetails&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;01-SEP-06&lt;/span&gt; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;Online Armor Antivirus+ is a data security solution produced by Tall Emu, an Australian security software company. The solution provides users with protection against spam, viruses, Trojans, worms and various blended Internet threats. Integration of the Kaspersky Anti-Virus engine into Online Armor will provide comprehensive protection against today&#39;s virus...&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;a href=&quot;http://www.accessmylibrary.com/coms2/summary_0286-19847805_ITM&quot;&gt;http://www.accessmylibrary.com/coms2/summary_0286-19847805_ITM&lt;/a&gt;&lt;span style=&quot;&quot;&gt;   &lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;articledetails&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;articledetails&quot;&gt; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Subscribe in a reader&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://onlinearmorpersonalfirewall.blogspot.com/feeds/992303058857391324/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3682883957791226401/992303058857391324' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/992303058857391324'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/992303058857391324'/><link rel='alternate' type='text/html' href='http://onlinearmorpersonalfirewall.blogspot.com/2008/03/online-armor-tall-emu-in-press.html' title='Online Armor &amp; Tall Emu in the Press'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3682883957791226401.post-1366039859300978855</id><published>2008-03-27T14:24:00.001+11:00</published><updated>2010-09-03T22:02:49.910+10:00</updated><title type='text'>Firewall Challenge - Online Armor Awarded the No. 1 spot</title><content type='html'>&lt;div style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;b&gt;Sydney, Australia, 26th March 2008&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;Tall Emu, a leading personal &lt;a href=&quot;http://www.online-armor.com/&quot;&gt;firewall&lt;/a&gt; developer, is pleased to announce that the free version of Online Armor Personal Firewall has come out on top in the most recent Personal Firewall Analysis tests performed by Matousec Transparent Security on March 25&lt;sup&gt;th&lt;/sup&gt; 2008.  Online Armor beat 10 of the top personal firewalls and security suites, becoming the only product to receive the coveted 100% success rating in the leak tests. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;b&gt;What is a firewall leak test?&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;Leak tests are small, non-destructive programs designed by security experts that deliberately attempt to bypass a firewall&#39;s outgoing security measures. The rationale behind them is simple: If these tests can get past your computer&#39;s security defences, then so can a hacker. Explicitly designed to help identify a firewall&#39;s security flaws, leak tests inform the user whether or not their firewall is providing adequate protection. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;This result comes a day after Online Armor was awarded &lt;a href=&quot;http://blog.scotsnewsletter.com/2008/03/24/the-best-firewall-software-of-2008-online-armor/&quot;&gt;“Best Firewall of 2008”&lt;/a&gt; by Scot’s Newsletter. (He is also &lt;/span&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;Editor in Chief at &lt;i&gt;&lt;a href=&quot;http://www.computerworld.com/&quot;&gt;Computerworld&lt;/a&gt;&lt;/i&gt;)&lt;/span&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;&lt;img src=&quot;http://www.feedburner.com/fb/images/pub/feed-icon32x32.png&quot; alt=&quot;&quot; style=&quot;border:0&quot;/&gt;&lt;/a&gt;&lt;a href=&quot;http://feeds.feedburner.com/OnlineArmorsOfficialMouthPiece&quot; title=&quot;Subscribe to my feed&quot; rel=&quot;alternate&quot; type=&quot;application/rss+xml&quot;&gt;Subscribe in a reader&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://onlinearmorpersonalfirewall.blogspot.com/feeds/1366039859300978855/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3682883957791226401/1366039859300978855' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/1366039859300978855'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3682883957791226401/posts/default/1366039859300978855'/><link rel='alternate' type='text/html' href='http://onlinearmorpersonalfirewall.blogspot.com/2008/03/matousec-firewall-challenge-online.html' title='Firewall Challenge - Online Armor Awarded the No. 1 spot'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry></feed>