Originally posted by Shinobi
It won't make your hardware invisible to him. This is a software firewall, not quite as effective as a true firewall.
heh you sure try scanning a linux box with only this rule and see what you get
iptables -A INPUT -p tcp -j REJECT --reject-with tcp-reset
and everyone knows that a software firewall is not as effective as a software.