Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

Jetico Personal Firewall 2.1.0.8.2426

Posted By: }|{yk
Jetico Personal Firewall 2.1.0.8.2426

Jetico Personal Firewall 2.1.0.8.2426 | 3.73 Mb

Jetico Personal Firewall software protects computers against hackers and malicious software when networked or connected to the Internet. It offers detailed, configurable event logs, reports, plus the option to view and edit the firewall configuration. The modular architecture is as open as possible to assist with easier evaluation of the security.

Jetico Personal Firewall Features:
Monitor running applications that access the network
Monitor selected/all network packets as well as selected network events
Choose a pre-defined Security Policy — the firewall rule set
Modify Security Policy to meet your needs
Make your own Security Policy

Three Layers of Protection

Low-level. (Network packet filter). This checks the validity of network packets and parameters such as source and destination addresses, protocol, etc.
Using this process, Jetico Personal Firewall can make your computer invisible to untrusted networks. By selecting the Optimal Protection Policy, your computer becomes "stealthy". Any security probing tests (for example, ShieldsUp! tests) by internet hackers will report that your computer does not exist.

Application-level. (Network events filter). This checks and enables you to monitor network/internet connection requests made by applications. If you aren't sure why an application wishes to send or receive data from the Internet you can limit or block the activity.

User-level. (Process activity filter). This notifies you of and prevents dirty tricks by Trojans and other malicious programs. A Trojan can inject its own code into programs on your computer and send data about you to a third party. For example, a Trojan in Internet Explorer could transmit details of your browsing preferences.