Skip to Content
3-10-2008 @ 11:20AM
To mitigate issues with trusting updaters I'd recommend using a Firewall and having the default rule be to block out-going connections from unapproved applications. That way if you get a keylogger, the thing it is going to do is not just log your key strokes but it has to send them somewhere. If you get a message that pops up and says "Allow program Xyz access to host 220.127.116.11?" and you've got no idea what that is then you know you have a problem.AVG Internet Security came bundled with a nice firewall and it was preconfigured to do exactly this.
First time? A confirmation email will be sent to you after submitting.
Members enter your username and password.
Enter your AOL or AIM screenname and password.
Please keep your comments relevant to this blog entry. Email addresses are never displayed, but they are required to confirm your comments.
When you enter your name and email address, you'll be sent a link to confirm your comment, and a password. To leave another comment, just use that password.
To create a live link, simply type the URL (including http://) or email address and we will make it a live link for you. You can put up to 3 URLs in your comments. Line breaks and paragraphs are automatically converted — no need to use <p> or <br /> tags.