I'm running Slacko and I activated the built in Firewall. Why, if I blocked all the ports in its configuration, can SeaMonkey access the Internet?
thanks
How to keep SeaMonkey from accessing the Internet?
- puppy_apprentice
- Posts: 299
- Joined: Tue 07 Feb 2012, 20:32
make yours changes in firewall again and in console use this:
copy and paste output on the forum, maybe someone will help u
more info about Puppy firewall:
http://forums.pcper.com/showthread.php?t=432469
http://wiki.centos.org/HowTos/Network/IPTables
or try to search for iptables on Puppy forum
Code: Select all
iptables -L
or
iptables -L -n
more info about Puppy firewall:
http://forums.pcper.com/showthread.php?t=432469
http://wiki.centos.org/HowTos/Network/IPTables
or try to search for iptables on Puppy forum
- Lobster
- Official Crustacean
- Posts: 15522
- Joined: Wed 04 May 2005, 06:06
- Location: Paradox Realm
- Contact:
At the level and the way you ask the question - no!woflux wrote:thanks i'm learning iptables command.
could a malicious program created for linux run in puppy and delete files, edit them, etc since i'm logged as root?
By learning stuff you will be educating yourself and addressing the issues that concern you . . .
http://youtu.be/_uZ_qZgOwg4
The most malicious program known to man . . . is reading this now. . . . did you guess yet . . .
You are the person most likely to do all that and then blame it on the dog . . . [the Puppy is innocent]
Once you know that running as root is dangerous because you can do stuff.
Once you know that phishers, Internet connections and ignorant Windows users and penguins bleating 'Ubuntu will save us' are out there you can feel safer . . .
Flash and javascript and old browsers are more of an issue . . .
I use them.
I don't use VPN or virtual box or the GROWL program I wrote
http://puppylinux.org/wikka/security
Puppy by default does not run unnecessary daemons in the background.
Puppy has been running as root and in the early days without a firewall.
Your router probably has a firewall.
Perhaps now we can all share our data with Google and Facebook and realise that Puppy is safe. We are the danger.
Tin Hats to maximum. Engage.
Puppy, the final frontier, exploring programs and strange new configurations. Bravely going where no penguin has before . . .
Yes, even all of them, if the program gained access and could run itself.woflux wrote:could a malicious program created for linux run in puppy and delete files, edit them, etc since i'm logged as root?
A malicious program could delete files on any active limited permission users home directory and sub-directories. But it probably would fail a lot at deleting files outside the home directory.
Here is how I like to look at it:
Suppose I run Ubuntu and it won't let me make a root account. I have to work as a limited user and run sudo when I want to escalate permissions.
A malicious program could run sudo, but it shouldn't have the password or a way to discover it. Meaning to say: It would be hard for it to run escalated permissions.
But the program can do as it is written to do in my home directory. It could even change all my active verbs to passive verbs.
What I want to protect are the user files in my home directory, and it is not any more protected than if I were root.
I don't care very much about the system files. Here is why: The Ubuntu disk and all the setup files are within arm's reach. I can recover from system damage easily. But recovering from a loss in the home directory might be near impossible, if I haven't implemented a regular back up system for that directory.
~