Home page logo

fulldisclosure logo Full Disclosure mailing list archives

Re: According to Ivan, the secret ZA phone-home server is located at [was Re: Re: Re: ZoneAlarm phones home]
From: Frank Knobbe <frank () knobbe us>
Date: Mon, 06 Feb 2006 09:13:50 -0600

On Mon, 2006-02-06 at 14:06 +0000, Dave Korn wrote:
The company says it will fix the "bug" soon. In the meantime you can
work >around it by adding:
# Block access to ZoneLabs Server zonelabs.com
to your Windows host file.

  2)  You aren't the first person in the world to mistake the loopback 
interface for a routable address, but you do look just as dumb as everyone 
else who's ever done it down the annals of history.

You might want to remove your foot from your own mouth. The loopback
thing is a workaround by which the host that it is trying to resolve is
entered in the hosts file of the system, having the effect that the
application tries to connect to the loopback adapter instead of
connecting to the Internet.

Don't know about you, but that works very well for me in regards to
blocking advertising in a browser.

You might want to think yourself before assailing other posters
verbally. But frankly, I don't care since your email just qualified you
for my plonker list.


PS: zonelabs.com resolves to in case you're still
wondering about an IP address.

PPS: Of course that's not proof of anything. Packet traces would be
preferred, but I'd think anyone with Zone Alarm could probably gather
those easily.

(...Why do I even care...)
It is said that the Internet is a public utility. As such, it is best
compared to a sewer. A big, fat pipe with a bunch of crap sloshing
against your ports.

Attachment: signature.asc
Description: This is a digitally signed message part

Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]