Personal Firewall won't stay on
Yesterday I started getting a Mcafee error message telling me my Personal Firewall was off. Every time I turn it on, it either doesn't go on or doesn't stay on. I contacted McAfee; they of course told me I had to contact Cox. Cox, of course, told me I had to contact McAfee. They also told me I could turn my Windows Firewall on, except when I try to I get an error message. (Likely because I've got McAfee set up!) System Restore hasn't helped. So I'm operating without a firewall, because the crooks at Cox bait you with McAfee but aren't willing to back it up. Anyone know what to do (besides go on social media and complain until someone helps me, because I'm already doing that!)?Solved8.4KViews0likes13Commentssecurity and router firmware updates
In light of the latest ubiquity of security breaches, I have to ask - does Cox routinely send out firmware upgrades when available [i.e. to Cox supplied Cable Modem/Routers such as the Cisco DPQ3925], or is that considered a customer responsibility? Not that we are, necessarily, a prime target, sill, I would feel more secure if our main "firewall" against malicious attacks/hacks to our local network was as robust as possible.6.1KViews0likes3CommentsSpam and Phishing
When will Cox support a "white list" similar to that I enjoyed with EarthLink in San Diego?. EarthLink allows you to reply to unknown email addresses with a nice message saying you don't recognize the address. You are then notified that that address sent a message and you can respond and also add them to your accept list. Wonderful feature. In San Diego I had the option to use EarthLink directly on my other cable service. Cox doesn't offer alternative companies. In San Diego I had the option of using the company URL, saan.rr.com, and RoadRunner. It would be a real win to use the EarthLink type software. Surely this high-priced Cox service can supply that option to us. They won't even respond to queries about such a service. "NOT AVAILABLE"2KViews0likes2CommentsCisco DPQ3925 - DoS-type alerts in firewall log
I'm seeing strange DoS-type alerts in the firewall log for my Cisco DPQ3925 gateway. This has been happening for at least a few days...possibly longer because I've never looked at the firewall log before. The log entry contains the following: Description: Teardrop or derivative Count: 58 Last Occurrence:Tue Sep 27 06:53:28 2016 Target:180.8.210.155:0 Source:0.0.63.0:0 Neither of those IPs are DHCP addresses since my network is in the 192.168.0.0/24 space. Over the past few days I've seen other examples for different remote target IPs and different descriptions including "Illegal Fragments" and "Ping of Death". So the alerts generally look like DoS attacks, but I'm not clear if the packets are inbound or outbound from my network. Sorry I cannot post a screenshot because the forum image selector is not working for me in the latest Chrome. When I look at the Connected Devices Summary in Setup > Lan Setup, there are no devices with either the target or source IP. Here's what I did years ago to secure the network: Changed default admin password to a strong password WPA2-Personal AES PSK, broadcast enabled MAC whitelist filter Remote management: disabled SPI firewall protection Off, because Xbox won't work with it on despite attempts to port forward etc. Block Anonymous Internet Requests: On Tiffany R re-pushed the latest firmware to the router about 24 hours ago, so the firmware is (and was) up-to-date and the activity is still happening. Has anyone seen this behavior before?1.5KViews0likes1CommentHow can I access my LINUX server from the internet
Hello everybody. I purchased a server a couple of weeks ago and I am trying to access it from the internet. The OS is Fedora 24 Server LINUX. The public IP address is 68.224.106.197. I have a .jpg file called pcie-bus-error.jpg in my /var/www/html directory as an example file. When I type 68.224.106.197/pcie-bus-error.jpg into the address bar of my browser, I can only see the image when I am at home and when I type "systemctl stop firewalld" on the server. I would like to be able to type 68.224.106.197/pcie-bus-error.jpg into the address bar of any browser from any computer without having to turn off my firewall. What do I do? Sincerely, Ken1.3KViews0likes1Comment