Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Let me ask, seriously: if we take the Great Firewall of China, it does all sorts of packet inspection. Why can't this be applied to personal firewalls and inspect the traffic leaving (or coming in) for malicious content being masked as allowed traffic, etc?

There was a company called Packeteer that did traffic shaping/inspection....could any concepts be applied to firewalling as they were to traffic prioritization?



for sure it could be done, however it is more complex and resource intensive. probably not good for laptops etc.


Can you share insight on how intensive of a task this is?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: