flat assembler
Message board for the users of flat assembler.
Index
> Windows > Packet filter? |
Author |
|
revolution 21 Dec 2008, 09:18
You need to either write your own driver or install an existing driver. Do a search for "pcap". I think it does what you need.
|
|||
21 Dec 2008, 09:18 |
|
Azu 21 Dec 2008, 09:23
Thanks, I'll take a look at it. Just to make sure we're on the same page first though, this will let me choose whether or not the packets are allowed through (not just look at them) right?
|
|||
21 Dec 2008, 09:23 |
|
revolution 21 Dec 2008, 09:25
Oh, for that I am not sure about.
|
|||
21 Dec 2008, 09:25 |
|
revolution 21 Dec 2008, 09:28
If pcap is not suitable, then another option is to use a local socks proxy. With a proxy you can have complete control over what is sent and received. But it requires you to set each app with the proxy settings and not all apps can support using a socks interface.
|
|||
21 Dec 2008, 09:28 |
|
Azu 21 Dec 2008, 09:30
It sounds like it wouldn't be low level enough to prevent programs from getting around it if they really want to.. and I don't think that will be able to stop other types of traffic like ICMP..
I'm sure there's a way though, because that's how all firewalls work right? Or did I just read your post wrong? I just want to route all data that is going to be sent in through or out of the ethernet port to be routed through this and have it decide whether or not to allow it through Last edited by Azu on 21 Dec 2008, 09:33; edited 1 time in total |
|||
21 Dec 2008, 09:30 |
|
revolution 21 Dec 2008, 09:33
Okay, if you are requiring it in such a way that programs are not aware what is happening then you definitely need to be at the driver level. Perhaps there is an open-source firewall that has a driver in it you can examine.
|
|||
21 Dec 2008, 09:33 |
|
Azu 21 Dec 2008, 09:36
Okay thanks I'll keep looking
|
|||
21 Dec 2008, 09:36 |
|
< Last Thread | Next Thread > |
Forum Rules:
|
Copyright © 1999-2024, Tomasz Grysztar. Also on GitHub, YouTube.
Website powered by rwasa.