Would you recommend installing the firewall component from McAfee 7.0 virus checker on a one-user XP system? And if so, do you have a general policy for how to set it up.
I am asking because I tried it once with unhappy results.
It was my understanding that a firewall would “protect” against “enemy” attempts to invade my computer. Instead it seemed to interfere with sites I want to access. And it spent a lot of time warning me about programs on my computer that wanted to “call” out.
Are my doubts misplaced?
Thanx, Al
![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
About McAfee firewall (IE 6.0)
Home » Forums » AskWoody support » Questions: Browsers and desktop software » Internet Explorer and Edge » About McAfee firewall (IE 6.0)
- This topic has 30 replies, 9 voices, and was last updated 21 years, 4 months ago.
AuthorTopicWSalgruber
AskWoody LoungerJanuary 14, 2004 at 5:28 pm #399094Viewing 3 reply threadsAuthorReplies-
DaveA
AskWoody_MVPJanuary 14, 2004 at 5:33 pm #768052First of all, I will NOT install any thing with the name McAfee on it.
You will find that the
version of ZoneAlarm from http://www.zonelabs.com[/url%5D is all you will need.
DaveA I am so far behind, I think I am First
Genealogy....confusing the dead and annoying the living -
WSHoward Kaikow
AskWoody LoungerJanuary 14, 2004 at 5:56 pm #768062I’ve always used Norton products for antivirus and a software firewall and been pretty happy with them. It seems that Norton has much less problems resource wise (and maybe any antivirus program) on an NT kernel based OS compared with Windows 9x. I tried ZA for a good while prior, but wanted to know how McAfee compares head to head with Symantec for home or small business, since in bricks and mortar stores those are the two that have the most prominent displays by far.
I value your perspective and experience on this. Could you say why you favor Symantec products so strongly over McAfee?
SMBP
-
DaveA
AskWoody_MVPJanuary 15, 2004 at 7:05 pm #768740SMBP,
I have been using Norton;s since the early DOS days, when I could carry the whole thing on a 3 1/5 floppy. It has treated me and my computers good.I have had to repair other’s machines that were running that McAfee stuff. A lot of the problems would go away as soon as McAfee was removed.
The worst machine I have had to repair was a “Compaq, running McAfee and AOL”. in my opinion these are the worlds biggest pile of
DaveA I am so far behind, I think I am First
Genealogy....confusing the dead and annoying the living -
DaveA
AskWoody_MVPJanuary 15, 2004 at 7:05 pm #768741SMBP,
I have been using Norton;s since the early DOS days, when I could carry the whole thing on a 3 1/5 floppy. It has treated me and my computers good.I have had to repair other’s machines that were running that McAfee stuff. A lot of the problems would go away as soon as McAfee was removed.
The worst machine I have had to repair was a “Compaq, running McAfee and AOL”. in my opinion these are the worlds biggest pile of
DaveA I am so far behind, I think I am First
Genealogy....confusing the dead and annoying the living
-
-
WSHoward Kaikow
AskWoody LoungerJanuary 14, 2004 at 5:56 pm #768063I’ve always used Norton products for antivirus and a software firewall and been pretty happy with them. It seems that Norton has much less problems resource wise (and maybe any antivirus program) on an NT kernel based OS compared with Windows 9x. I tried ZA for a good while prior, but wanted to know how McAfee compares head to head with Symantec for home or small business, since in bricks and mortar stores those are the two that have the most prominent displays by far.
I value your perspective and experience on this. Could you say why you favor Symantec products so strongly over McAfee?
SMBP
-
-
DaveA
AskWoody_MVPJanuary 14, 2004 at 5:33 pm #768053First of all, I will NOT install any thing with the name McAfee on it.
You will find that the
version of ZoneAlarm from http://www.zonelabs.com[/url%5D is all you will need.
DaveA I am so far behind, I think I am First
Genealogy....confusing the dead and annoying the living -
WSjscher2000
AskWoody LoungerJanuary 14, 2004 at 6:27 pm #768080Software firewalls are designed to provide “two-way” protection: prevent undesired incoming and outgoing connections. This may help you identify spyware and trojans that, unbeknownst to you, are spilling data out to somewhere else.
Depending on the features of a given product, you usually can identify applications to which you are giving carte blanche to send to the Internet, and then just deal with prompts for a few unexpected ones. Whether McAfee’s implementation is any good, I have no idea.
-
WSalgruber
AskWoody Lounger -
WSTonyE
AskWoody Lounger -
WSTonyE
AskWoody Lounger -
WSviking33
AskWoody LoungerJanuary 15, 2004 at 4:56 pm #768666 -
WSviking33
AskWoody LoungerJanuary 15, 2004 at 4:56 pm #768667 -
WSHoward Kaikow
AskWoody LoungerJanuary 15, 2004 at 8:17 pm #768560Al–
You can get plenty of information on how any software firewall works on the web. The manufacturer’s site will have information, and if you want to go deeper, there will be a tech support section and forums on the site. You could also use something like google groups or yahoo groups or any search engine and get endless information on a particular question. They “do you plenty good.”
They manage traffic in and out of your system. Two essentials you do not want to run your computer(s) without any more than you’d run your car on tires that will blow any second are updated viral definitions and a decent software firewall. The native firewall in Windows XP has received much criticism because it does not address traffic going out, and Microsoft has vowed not to repeat that mistake next time they get a chance to offer you one. This is why most people on the Lounge would advise you to get some other kind of sofware firewall and if you’re using ZA–ZA has gotten some high marks from a lot of people.
SMBP
-
WSalgruber
AskWoody LoungerJanuary 15, 2004 at 5:04 pm #768673Yes, “You can get plenty of information” or rather, “You can get plenty of Words” but not a lot of sense.
Example: item#1 on McAfee’s list of functions is “Control internet programs” which turns out to mean programs on my computer that want to access the internet. But why would I (a single computer user) want to monitor my “outgoing traffic.” McAfee does not address this question. So here’s what I would guess:
*If an “enemy” has successfully invaded my machine, it will want to communicate outwards, to propagate itself onto other machines or to bring in more bad guys.*
Well, I guess it would be altruistic on my part to block the propagation of evil, but certainly, my reason for installing a firewall is to block incoming in the first place, not outgoing.
Furthermore, it appears to me that any industry that sustains itself by making an updated list of all the viruses ever created, could also make a list of the comparatively few programs that have a legitimate reason to communicate “out”. They could then block (and kill?) non-legit communicators instead of asking me if it’s ok. Ok, being more careful, they could ask me if I have any reason to pardon these transgressors instead of killing them.The McAfee display also makes a big thing out of the “Warnings” it has logged.
Here’s the detail on one of these:
McAfee Firewall blocked an outgoing TCP packet.
The remote address associated with the traffic was 207.44.158.6.
The remote port was 80 [HTTP].
The local port on your PC was 1295 [ephemeral].
The network adapter for the traffic was “Kingston EtheRx PCI Fast Ethernet Adapter (DS21143)”.
The binary data contained in the packet was “00 60 0f e9 1e fa 00 c0 f0 4d 62 20 08 00 45 00 00 28 e3 08 00 00 80 06 28 8c c0 a8 01 60 cf 2c 9e 06 05 0f 00 50 00 2e 03 76 00 2e 03 76 50 04 00 00 73 fe 00 00 “.How is this protecting me from having my tires blow out?
Since McAfee hasn’t warned me of any bad guys living on my computer, why is he interfering when my good guys want to communicate out?
Giving the benefit of the doubt, I suppose it might be useful to a network administrator.Finally, I am not a wise-ass. I have tried to ask a precise question here, (maybe a little aggressively) because I would love to know the answer. Come on in.
Thanx, Al -
WSunkamunka
AskWoody LoungerJanuary 15, 2004 at 5:14 pm #768677Without going too far into the plumbing: “The remote address associated with the traffic was 207.44.158.6.”. If you either type this into your browser or run a Search at, say, http://www.arin.net/whois/%5B/url%5D, you will be able to find out where the outgoing journey was directed. If it turns out to have been bona fide, then you can adjust your firewall policy accordingly.
Part of the power of a Trojan is that it will take over a “legit communicator” and take it wherever the Trojan wants to go.
For the record, the firewall I use is not a McAfee firewall.
HTH
-
WSunkamunka
AskWoody LoungerJanuary 15, 2004 at 5:14 pm #768678Without going too far into the plumbing: “The remote address associated with the traffic was 207.44.158.6.”. If you either type this into your browser or run a Search at, say, http://www.arin.net/whois/%5B/url%5D, you will be able to find out where the outgoing journey was directed. If it turns out to have been bona fide, then you can adjust your firewall policy accordingly.
Part of the power of a Trojan is that it will take over a “legit communicator” and take it wherever the Trojan wants to go.
For the record, the firewall I use is not a McAfee firewall.
HTH
-
WSviking33
AskWoody LoungerJanuary 15, 2004 at 8:08 pm #768777—————————————————–
Finally, I am not a wise-ass. I have tried to ask a precise question here, (maybe a little aggressively) because I would love to know the answer. Come on in.
—————————————————-Who & in what post did someone call you that? I thought you got a few good answers to your question! ??
Bob
-
WSviking33
AskWoody LoungerJanuary 15, 2004 at 8:08 pm #768778—————————————————–
Finally, I am not a wise-ass. I have tried to ask a precise question here, (maybe a little aggressively) because I would love to know the answer. Come on in.
—————————————————-Who & in what post did someone call you that? I thought you got a few good answers to your question! ??
Bob
-
WSjscher2000
AskWoody LoungerJanuary 16, 2004 at 6:13 am #769049> Well, I guess it would be altruistic on my part to block the propagation of evil, but certainly, my reason for
> installing a firewall is to block incoming in the first place, not outgoing.Even if you don’t care about the propagation of evil, you might care about the propagation of your passwords and financial data to identity thieves. This threat is very real, and if you choose to forego one layer of defense against it because it’s a hassle, that is your choice.
The packet you illustrated is definitely not very helpful. Other than the destination address and port (http://207.44.158.6:80/%5B/url%5D), you’re in the dark because the application doesn’t appear to be sensitive to the application sending the packet. If you can only regulate by port, this kind of filtering isn’t very useful because you basically have to open port 80 (outbound) to preserve your sanity, and most applications can redirect their traffic over commonly used ports.
Oh well, maybe in the next version…
-
WSalgruber
AskWoody LoungerJanuary 16, 2004 at 2:51 pm #769354J, Thanks for your sensible answer. I certainly wouldn’t want my passwords broadcast.
Question: I’ve read about programs that try millions of passwords quickly, and about programs that look over your shoulder when you type in a password. But can hackers actually decode your password files, and if so, where do I get one I can use when I forget my password. Or, for that matter, where is the file that holds the passwords I told the computer to remember?
Thanks, Al -
WSJohnGray
AskWoody LoungerJanuary 16, 2004 at 4:26 pm #769410Al
With regard to “the file that holds the passwords I told the computer to remember?” I suggest you look through this thread. It may not apply in your circumstance but it would be worth checking.
This thread deals with infections via web browsers.
As a result of the Webber trojan I was unsure if the credit card number and security code which I use for internet purchases had been compromised/sent out to the hacker, so I cancelled it and got the issuer to send me a new one. I couldn’t take the risk…!
At the time i had the XP ICF firewall switched on (as others have said this only protects incoming data) and my antivirus software was, as it always is, up-to-date by a usually twice-weekly download of new pattern files.Another computing lesson learned…
-
WSJohnGray
AskWoody LoungerJanuary 16, 2004 at 4:26 pm #769411Al
With regard to “the file that holds the passwords I told the computer to remember?” I suggest you look through this thread. It may not apply in your circumstance but it would be worth checking.
This thread deals with infections via web browsers.
As a result of the Webber trojan I was unsure if the credit card number and security code which I use for internet purchases had been compromised/sent out to the hacker, so I cancelled it and got the issuer to send me a new one. I couldn’t take the risk…!
At the time i had the XP ICF firewall switched on (as others have said this only protects incoming data) and my antivirus software was, as it always is, up-to-date by a usually twice-weekly download of new pattern files.Another computing lesson learned…
-
WSalgruber
AskWoody LoungerJanuary 16, 2004 at 2:51 pm #769355J, Thanks for your sensible answer. I certainly wouldn’t want my passwords broadcast.
Question: I’ve read about programs that try millions of passwords quickly, and about programs that look over your shoulder when you type in a password. But can hackers actually decode your password files, and if so, where do I get one I can use when I forget my password. Or, for that matter, where is the file that holds the passwords I told the computer to remember?
Thanks, Al -
WSjscher2000
AskWoody LoungerJanuary 16, 2004 at 6:13 am #769050> Well, I guess it would be altruistic on my part to block the propagation of evil, but certainly, my reason for
> installing a firewall is to block incoming in the first place, not outgoing.Even if you don’t care about the propagation of evil, you might care about the propagation of your passwords and financial data to identity thieves. This threat is very real, and if you choose to forego one layer of defense against it because it’s a hassle, that is your choice.
The packet you illustrated is definitely not very helpful. Other than the destination address and port (http://207.44.158.6:80/%5B/url%5D), you’re in the dark because the application doesn’t appear to be sensitive to the application sending the packet. If you can only regulate by port, this kind of filtering isn’t very useful because you basically have to open port 80 (outbound) to preserve your sanity, and most applications can redirect their traffic over commonly used ports.
Oh well, maybe in the next version…
-
-
WSalgruber
AskWoody LoungerJanuary 15, 2004 at 5:04 pm #768674Yes, “You can get plenty of information” or rather, “You can get plenty of Words” but not a lot of sense.
Example: item#1 on McAfee’s list of functions is “Control internet programs” which turns out to mean programs on my computer that want to access the internet. But why would I (a single computer user) want to monitor my “outgoing traffic.” McAfee does not address this question. So here’s what I would guess:
*If an “enemy” has successfully invaded my machine, it will want to communicate outwards, to propagate itself onto other machines or to bring in more bad guys.*
Well, I guess it would be altruistic on my part to block the propagation of evil, but certainly, my reason for installing a firewall is to block incoming in the first place, not outgoing.
Furthermore, it appears to me that any industry that sustains itself by making an updated list of all the viruses ever created, could also make a list of the comparatively few programs that have a legitimate reason to communicate “out”. They could then block (and kill?) non-legit communicators instead of asking me if it’s ok. Ok, being more careful, they could ask me if I have any reason to pardon these transgressors instead of killing them.The McAfee display also makes a big thing out of the “Warnings” it has logged.
Here’s the detail on one of these:
McAfee Firewall blocked an outgoing TCP packet.
The remote address associated with the traffic was 207.44.158.6.
The remote port was 80 [HTTP].
The local port on your PC was 1295 [ephemeral].
The network adapter for the traffic was “Kingston EtheRx PCI Fast Ethernet Adapter (DS21143)”.
The binary data contained in the packet was “00 60 0f e9 1e fa 00 c0 f0 4d 62 20 08 00 45 00 00 28 e3 08 00 00 80 06 28 8c c0 a8 01 60 cf 2c 9e 06 05 0f 00 50 00 2e 03 76 00 2e 03 76 50 04 00 00 73 fe 00 00 “.How is this protecting me from having my tires blow out?
Since McAfee hasn’t warned me of any bad guys living on my computer, why is he interfering when my good guys want to communicate out?
Giving the benefit of the doubt, I suppose it might be useful to a network administrator.Finally, I am not a wise-ass. I have tried to ask a precise question here, (maybe a little aggressively) because I would love to know the answer. Come on in.
Thanx, Al
-
-
WSHoward Kaikow
AskWoody LoungerJanuary 15, 2004 at 8:17 pm #768561Al–
You can get plenty of information on how any software firewall works on the web. The manufacturer’s site will have information, and if you want to go deeper, there will be a tech support section and forums on the site. You could also use something like google groups or yahoo groups or any search engine and get endless information on a particular question. They “do you plenty good.”
They manage traffic in and out of your system. Two essentials you do not want to run your computer(s) without any more than you’d run your car on tires that will blow any second are updated viral definitions and a decent software firewall. The native firewall in Windows XP has received much criticism because it does not address traffic going out, and Microsoft has vowed not to repeat that mistake next time they get a chance to offer you one. This is why most people on the Lounge would advise you to get some other kind of sofware firewall and if you’re using ZA–ZA has gotten some high marks from a lot of people.
SMBP
-
WSWyllyWylly
AskWoody LoungerJanuary 16, 2004 at 6:27 am #769068[indent]
do they actually do the typical dummy (like me) any good
[/indent]Absolutely. I liken computers on a network to many doors in a hallway, and a trojan/hacker trying all the doorknobs. Your door in this hallway is hidden, and also locked, to any comers who give the knob a jangle.
Understanding how they work is nice, but not required. Better to be protected than to be swimming in the shark tank with a bleeding wound.
-
WSWyllyWylly
AskWoody LoungerJanuary 16, 2004 at 6:27 am #769069[indent]
do they actually do the typical dummy (like me) any good
[/indent]Absolutely. I liken computers on a network to many doors in a hallway, and a trojan/hacker trying all the doorknobs. Your door in this hallway is hidden, and also locked, to any comers who give the knob a jangle.
Understanding how they work is nice, but not required. Better to be protected than to be swimming in the shark tank with a bleeding wound.
-
-
WSalgruber
AskWoody Lounger
-
-
WSjscher2000
AskWoody LoungerJanuary 14, 2004 at 6:27 pm #768081Software firewalls are designed to provide “two-way” protection: prevent undesired incoming and outgoing connections. This may help you identify spyware and trojans that, unbeknownst to you, are spilling data out to somewhere else.
Depending on the features of a given product, you usually can identify applications to which you are giving carte blanche to send to the Internet, and then just deal with prompts for a few unexpected ones. Whether McAfee’s implementation is any good, I have no idea.
Viewing 3 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Installer program can’t read my registry
by
Peobody
2 hours, 50 minutes ago -
How to keep Outlook (new) in off position for Windows 11
by
EspressoWillie
4 hours, 59 minutes ago -
Intel : CVE-2024-45332, CVE-2024-43420, CVE-2025-20623
by
Alex5723
2 hours, 43 minutes ago -
False error message from eMClient
by
WSSebastian42
2 hours, 37 minutes ago -
Awoke to a rebooted Mac (crashed?)
by
rebop2020
11 hours, 42 minutes ago -
Office 2021 Perpetual for Mac
by
rebop2020
12 hours, 54 minutes ago -
AutoSave is for Microsoft, not for you
by
Will Fastie
4 hours, 14 minutes ago -
Difface : Reconstruction of 3D Human Facial Images from DNA Sequence
by
Alex5723
16 hours, 26 minutes ago -
Seven things we learned from WhatsApp vs. NSO Group spyware lawsuit
by
Alex5723
2 hours, 27 minutes ago -
Outdated Laptop
by
jdamkeene
21 hours, 52 minutes ago -
Updating Keepass2Android
by
CBFPD-Chief115
1 day, 3 hours ago -
Another big Microsoft layoff
by
Charlie
1 day, 2 hours ago -
PowerShell to detect NPU – Testers Needed
by
RetiredGeek
6 hours, 22 minutes ago -
May 2025 updates are out
by
Susan Bradley
2 hours, 16 minutes ago -
Windows 11 Insider Preview build 26200.5600 released to DEV
by
joep517
1 day, 9 hours ago -
Windows 11 Insider Preview build 26120.3964 (24H2) released to BETA
by
joep517
1 day, 9 hours ago -
Drivers suggested via Windows Update
by
Tex265
1 day, 8 hours ago -
Thunderbird release notes for 128 esr have disappeared
by
EricB
1 day, 6 hours ago -
CISA mutes own website, shifts routine cyber alerts to X, RSS, email
by
Nibbled To Death By Ducks
1 day, 15 hours ago -
Apple releases 18.5
by
Susan Bradley
1 day, 10 hours ago -
Fedora Linux 40 will go end of life for updates and support on 2025-05-13.
by
Alex5723
1 day, 17 hours ago -
How a new type of AI is helping police skirt facial recognition bans
by
Alex5723
1 day, 17 hours ago -
Windows 7 ISO /Windows 10 ISO
by
ECWS
2 hours, 20 minutes ago -
No HP software folders
by
fpefpe
2 days, 1 hour ago -
Which antivirus apps and VPNs are the most secure in 2025?
by
B. Livingston
22 hours, 57 minutes ago -
Stay connected anywhere
by
Peter Deegan
2 days, 7 hours ago -
Copilot, under the table
by
Will Fastie
9 hours, 25 minutes ago -
The Windows experience
by
Will Fastie
2 days, 13 hours ago -
A tale of two operating systems
by
Susan Bradley
17 hours, 28 minutes ago -
Microsoft : Resolving Blue Screen errors in Windows
by
Alex5723
2 days, 18 hours ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.