this post was submitted on 16 May 2024
22 points (89.3% liked)

Tech

457 readers
9 users here now

A community for high quality news and discussion around technological advancements and changes

Things that fit:

Things that don't fit

Community Wiki

founded 8 months ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] bitfucker@programming.dev 4 points 5 months ago

Correct me if I am wrong, isn't a simple firewall that blocks incoming and outgoing connection is basically impenetrable? Because when something tries to connect, then the connection is dropped immediately unless on a certain port. If even the connection attempt were ignored, how would an exploit achieve some form of connection? Unless we are talking about application level firewall or deep packet inspection