Will my security software prevent my confidential data from being transmitted to a hacker?
Will my security software stop a virus from corrupting or destroying my important documents?
TEST YOUR SECURITY SOFTWARE & find an answer to these questions right here. Learn more.
TooLeaky does not send or receive data itself, it attempts to launch a hidden instance of Internet Explorer with the URL in the command line parameter. Personal data may be transferred in the URL to the Internet server.
How it works: The program transmits the string "PersonalInfoGoesHere" to Steve Gibson's web site and then retrieves a string back from Steve Gibson's web site, stored in the
|Type of Test||HIPS and Firewall|
|Techniques used||Parent Substitution|
|Operating System(s)||Windows 2000/ Windows XP/ Windows Vista|
|Number of Tests||1|