Here is my opinion on FPC.
You could use a tool like wget or Spondulas to download the code, or you could use a sand boxed machine to browse to the URI and view the source. You could put the URI into some online site checker and see what it finds. You could check the reputation of the domain.
But, what if you are capturing full packets going in and out of your network to the Internet?
You CAN do intrusion analysis without FPC, but you can’t do it as quickly OR as effectively.
Flow data and logs and threat intelligence are all fine (well, maybe not so much on the threat intelligence) but having packets trumps them all.
This is a Security Bloggers Network syndicated blog post authored by JeffSoh. Read the original post at: JeffSoh on NetSec