![]() ![]()
Seconfig XP
Freeware security configuration utility for Windows.
| |
Seconfig XP Other software Miscellaneous | |
Stats
Page translation
|
Background of Seconfig XP
Although on recent versions of Windows (e.g. Windows XP SP2) some Microsoft Networks objects have more restrictive default permissions, the ports are still opened (and Windows components running behind them are still ready to accept communications from the network). There is one more problem with these critical system components - so called buffer overflow exploits (which, if successfully directed at unpatched computer, bypasses any access restrictions and runs any given code on that victim computer). Example of such code is famous Blaster worm. There are two more problems with firewalls. First is that a firewall must be running without interruption all the time critical Windows components run. These components and firewall both are automatically started while loading Windows, but which one first?! Actually this depends on various conditions (firewall used, Windows configuration etc.). And also - what happens if user temporary disables firewall for some reason (or the firewall crashes)? In most cases system is left totally unprotected. The second problem is that the firewall must block all traffic that can be interpreted as communication attempt by those critical Windows components (although this task is relatively good solved by most modern firewalls). Seconfig XP can configure NetBIOS, SMB and RPC not to use TCP/IP (networking protocol suite used in Internet) as a transport protocol, thus leaving these ports (135, 137-139 and 445) truly closed. With Seconfig XP is also possible to configure other security related TCP/IP settings and disable some insecure and mostly unneeded Windows components. Note: Seconfig XP is not a firewall (or replacement of firewalls) - it is a completely different thing. |