Like every other website on the planet, SmallNetBuilder uses cookies. Our cookies track login status, but we only allow admins to log in anyway, so those don't apply to you. Any other cookies you pick up during your visit come from advertisers, which we don't control.
If you continue to use the site, you agree to tolerate our use of cookies. Thank you!

Router Charts

Click for Router Charts

Router Ranker

Click for Router Ranker

NAS Charts

Click for NAS Charts

NAS Ranker

Click for NAS Ranker

More Tools

Click for More Tools

LAN & WAN Reviews

Intrusion Detection, Identity Protection

The Firewall Intrusion Detection menu controls a thin client function. When you click on this menu, a popup menu appears that asks if it is OK to kick off its thin client suite application. The Intrusion Detection app. simply watches outgoing programs and prompts (by default) you to allow them or not allow them access to the Internet. This isn't really as much "Intrusion Detection" as it is a software firewall like Win XP SP2's built-in one that caused many of my installation hassles.

It was entertaining to monitor how many programs reach out and touch the Internet... until about the 10th program. Figure 19 shows you the dialog to add or remove programs and to set permissions (allow or block) on those programs.

Firewall Intrusion Detection window

Figure 19: Firewall Intrusion Detection window

When you click on the Identity Protection menu you get an immediate prompt to start the thin client on the computer you are using. Figure 20 shows what the main screen and popup look like.

Identity Protection screen

Figure 20: Identity Protection screen (click to enlarge)

After you enter the correct password, the Identity Protection settings window opens up. On the left side of Figure 21, you add files and folders of private data, while on the right side, you add web sites that can access the private data. It appears that there is only one degree of privacy (private or not private).

Identity Protection Settings

Figure 21: Identity Protection Settings (click to enlarge)

This feature is kind of odd, since a good deal of identify theft comes from phishing and pharming exploits rather than remote sites reaching out and sucking data off of users' computers. Like many other of the DSD-150's features, this one needs further work to really be worthy of its name.

More LAN & WAN

Wi-Fi System Tools
Check out our Wi-Fi System Charts, Ranker and Finder!

Support Us!

If you like what we do and want to thank us, just buy something on Amazon. We'll get a small commission on anything you buy. Thanks!

Over In The Forums

Hello guys.Right now I'm using that line to make a backup of my entire jffs in shell:Bash: tar -cf some_folder/jffs_"$FWVER".tar /jffs >/dev/null 2>&...
This is FlexQoS, a fork of the original, groundbreaking FreshJR_QOS script written by @FreshJR.FlexQoS provides a fully customizable Adaptive QoS expe...
Supermicro SuperServer E302-9D Review: A Fanless 10G pfSense Powerhouse www.anandtech.com With this piece of kit, I could see myself wadin...
Hello,I'll start by saying that I'm a bit of a novice with networking and I've been searching around for information about this for ages and I'm a bit...
WelcomeThis is Diversion - the Router Ad-Blocker for Asuswrt-Merlin All install and update infos are on the Diversion website.May 04 2020Diversion 4....

Don't Miss These

  • 1
  • 2
  • 3