On 27.08.2019 18:14, Björn Persson wrote: > If it could come from anywhere, then we must assume that it's malicious. > You executed untrusted code. It's already past your firewall. Game over, > you're infected. You're closing the stable door after the horse has > bolted. Any application can run backdoor or proxy on your machine with disabled firewall. Everyone from the Internet can connect it. If the firewall is enabled and all ports are closed, hacker cannot access your system. They will need to bypass firewall first and this is much more difficult. -- Sincerely, Vitaly Zaitsev (vitaly@xxxxxxxxxxxxxx) _______________________________________________ devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/devel@xxxxxxxxxxxxxxxxxxxxxxx