Whats the difference between the Spyware Blocklists (Type 1, 2, 3, and 4)?
Well, let’s start with the most secure one of all, the Type 3 list. The Type 2 and 3 lists are all identical except how the very last rule, the “Block All” rule, is handled. This rule is actually the most important of all of them, as it blocks any traffic not permitted or blocked by the rules located above it. In the Kerio Type 3 list, the “Block All” blocks all traffic, incoming and outgoing, that isn’t permitted or denied by the rules above it (mainly, the rules permitting your browser(s) and email program(s) from talking to the Internet). Any data not requested by your browser, email program, or whatever gets blocked. Also, if there are any trojans or worms running on your machine, they will also be stopped*. The one major downside to Blocking All in both directions is that if you try to run any new program that needs to talk to the net, and it’s not already on Kerio’s list of allowed programs, it will be blocked from talking to the net and you will not get a pop-up window asking yo