7bit 3 hours ago

Why should I choose to introduce software with potential security flaws, when I can simply use the built-in firewall?

efilife 17 hours ago

For those looking for something similar, try SimpleWall: https://github.com/henrypp/simplewall

It's deny by default, you get a popup when something wants to make a connection, then you can allow. Pre-built binaries available. It's my go-to since many years

  • knowitnone 16 hours ago

    simplewall is archived and unmaintained

    • Onawa 10 hours ago

      Not the repo that was linked, says they pushed a new version a week ago.

    • efilife 12 hours ago

      It gets updates almost daily

WarOnPrivacy 2 days ago

Necessary tools:

    Microsoft Visual Studio 2019 or 2022
    Wix v3.14 Toolset
    Visual Studio extension for Wix v3 Toolset
To build the application... (You get the idea.)
  • p_ing 2 days ago

    I don’t see what the issue is with the dev tools used. VS is nice as it has always been. Wix is very convenient and makes building msi ez. But I wonder why the dev thought a 3rd party Windows fw was necessary.

    • atmanactive 2 days ago

      > But I wonder why the dev thought a 3rd party Windows fw was necessary

      Because windows' built-in firewall is of static nature, and as such, useless in the personal firewall role.

      • p_ing a day ago

        What does "static nature" mean, in your parlance?

        • atmanactive a day ago

          Windows Firewall, similar to IPtables, can only be set to on or off per rule. Yes, you can configure it however you like, but it has zero interaction with the user while it's running (except for a simple on/off checkbox on first socket listen occurrence).

          In contrast, traditional third-party firewall programs for Windows were always fully interactive and would offer much finer control in that way. Something we would call a personal firewall. A personal firewall would allow users to inspect and control each and every network interaction (not just LISTEN).

          Ever since I found a folder on my drive titled "xxx was here", back in 1999, on windows, I've been using a personal firewall. Changed many over the years, and now running Fort.

          https://github.com/tnodir/fort

          • bzmrgonz 21 hours ago

            I remember using comodo at one time. Is fort the best you've had throughout the years? I've been searching for a robust in-host firewall for an ancient win2k8 server I cannot shutdown. I remember comodo had a verbose setting which told you what was being being blocked when it was being blocked. Was very helpful in troubleshooting.

            • atmanactive 21 hours ago

              Comodo was great until I've discovered it is using file system's altstreams to hash the files which resulted in sync programs constantly re-syncing all files. Naturally, when I start a backup/sync program, I expect only the last added/changed 1% to be transferred. With Comodo firewall installed, this wasn't the case. After digging for a way to disable that, I had to uninstall it.

              Fort is my current number one, for sure.

            • n4te 18 hours ago

              Windows Firewall Control is good, binisoft iirc.

        • waste_monk a day ago

          I am assuming they're referring to TinyWall's "allowlist this process" or time-based rule capabilities. Windows Defender firewall can allowlist applications, but you have to feed it a path to the executable image.

          Such things have been around for ages - I remember getting a free license somehow for a host-based IDS back in the Windows Vista times (struggled to look it up but I believe it was SAX2 by Ax3soft). It had some interesting features but running on an underpowered laptop the overhead cost more frustration than it was worth.