Categories
Technical
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
Share With Friends
Archive by Date
2012-08-06
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
Search Tag
成功经验
Cimarron
CD101
Deutsh
AERONAUTICS
Bioprocess
Kenso
Tsukuyomi
sold
Communal
kommenden
S07E06
Drydock
Blau
Acuna
Pati
Flavio
Quentes
Stood
Vuelo
Legenderna
misura
greek
stitching
HIDDE
Arbors
left
rdige
Kool
Risque
数学分析
EWMF
Effective
Fanfares
Feed
Foresight
FEAT
toxikologie
Faryad
Sincerely
Rabbi
Dagostino
gallereya
Bueker
Pickup
Unwiederbringlich
Revitalization
adulthood
educacion
Propensity
Newest
Software Related Brian S. Madden, "Citrix MetaFrame XP: Advanced Technical Design Guide" (Repost)
Software Related Dreamweaver CS6: The Missing Manual
Software Related Ashley Shepherd, "Pro Tools for Video, Film, and Multimedia" (Repost)
Software Related Ken Bluttman, "Access Hacks: Tips & Tools for Wrangling Your Data" (Repost)
Software Related Aron Hsiao, "Sams Teach Yourself Red Hat Linux Fedora in 24 Hours"(Repost)
Software Related Israel Koren, C. Mani Krishna, «Fault-Tolerant Systems» (Repost)
Software Related Jeff Gamet, "Designer's Guide to Mac OS X Tiger" (Repost)
Software Related How to Cheat at Managing Microsoft Operations Manager 2005 [Repost]
Software Related The Finite Element Method: Linear Static and Dynamic Finite Element Analysis by Thomas J. R. Hughes (Repost)
Software Related Techniques of Semigroup Theory (Oxford Science Publications) by Peter M. Higgins (Repost)
Software Related Equations de Pfaff algebriques (Lecture notes in mathematics) by Jean-Pierre Jouanolou (Repost)
Software Related Curves and Surfaces in Computer Aided Geometric Design by Fujio Yamaguchi (Repost)
Software Related Introduction to Lie Algebras and Representation Theory (Graduate Texts in Mathematics) by J.E. Humphreys (Repost)
Software Related Mary Millhollon, "Microsoft Office 2003 Inside Out" (Repost)
Software Related *- Autonomous Categories (Lecture Notes in Mathematics) by M. Barr (Repost)
Software Related Simon St. Laurent, "Office 2003 XML" (Repost)
Software Related Blake Ross, «Firefox For Dummies» (Repost)
Software Related InDesign CS / CS2 Killer Tips
Software Related Microsoft® Office Excel® 2003 Step by Step [Repost]
Software Related Word 2003 In Pictures (Repost)
Software Related Dreamweaver CS6: The Missing Manual
Software Related Ashley Shepherd, "Pro Tools for Video, Film, and Multimedia" (Repost)
Software Related Ken Bluttman, "Access Hacks: Tips & Tools for Wrangling Your Data" (Repost)
Software Related Aron Hsiao, "Sams Teach Yourself Red Hat Linux Fedora in 24 Hours"(Repost)
Software Related Israel Koren, C. Mani Krishna, «Fault-Tolerant Systems» (Repost)
Software Related Jeff Gamet, "Designer's Guide to Mac OS X Tiger" (Repost)
Software Related How to Cheat at Managing Microsoft Operations Manager 2005 [Repost]
Software Related The Finite Element Method: Linear Static and Dynamic Finite Element Analysis by Thomas J. R. Hughes (Repost)
Software Related Techniques of Semigroup Theory (Oxford Science Publications) by Peter M. Higgins (Repost)
Software Related Equations de Pfaff algebriques (Lecture notes in mathematics) by Jean-Pierre Jouanolou (Repost)
Software Related Curves and Surfaces in Computer Aided Geometric Design by Fujio Yamaguchi (Repost)
Software Related Introduction to Lie Algebras and Representation Theory (Graduate Texts in Mathematics) by J.E. Humphreys (Repost)
Software Related Mary Millhollon, "Microsoft Office 2003 Inside Out" (Repost)
Software Related *- Autonomous Categories (Lecture Notes in Mathematics) by M. Barr (Repost)
Software Related Simon St. Laurent, "Office 2003 XML" (Repost)
Software Related Blake Ross, «Firefox For Dummies» (Repost)
Software Related InDesign CS / CS2 Killer Tips
Software Related Microsoft® Office Excel® 2003 Step by Step [Repost]
Software Related Word 2003 In Pictures (Repost)
Useful Links
Software Related Jetico Personal Firewall 2.0.2.8.2327
Posted on 2010-08-03
|
More Jetico Personal Firewall protects your computer from unwanted hacker's attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity. Jetico Personal Firewall checks every packet that comes in or out of your computer. Using configuration sets for Security Policy you define how your computer is connected to the local network and the whole Internet. Your computer may be completely hidden from any unfriendly attempts to access your hard drive while you are able to access any web sites you want and you decide on which applications are allowed to access Internet and which are not. With Jetico Personal Firewall you feel secure, safe and protected while enjoying all Internet activities. The Jetico Personal Firewall software allows the user: - Protect computer from both inbound hackers' attacks from network as well as from unwished network access attempts performed by malicious software. - Choose a pre-defined Security Policy. - Edit existing Security Policy. - Create own Security Policy (i.e. the firewall rule set configuration). - Monitor running applications that access network. - Monitor selected/all the network packets as well as selected network events. New features in Jetico Personal Firewall v.2: System-related • Jetico Personal Firewall v2 runs as privileged Windows service. It can protect computer before user logon. • Native support for Windows XP Fast User Switching and Terminal Services. • Jetico Personal Firewall supports Access Control Lists for all main functions. Administrator can configure ACL to grant access to particular firewall functions for any user or group. • Windows XP Service Pack 2 Security left support. User interface • Improved rule editing interface. • New popup message. The new look for popup dialog is presented. Popup message text and rule creation options can be modified. • Firewall variables formerly controlled by Configuration Wizard, are integrated into main application window. • Language file support for easy localization. All translatable words and phrases are taken from single UTF-8 encoded text file. Configuration • New XML-based open configuration file format. Detailed documentation is available upon request. • The new version maintains single protected firewall configuration for all users. • Simplified controls for configuration. • New hash handling scheme. Separate table for hash checking. • Each firewall filtering layer has own root table. • New automatic variables (per-connection) for local connections are supported. Firewall rules • Rules support lists of parameters where possible. • IP rules support IP address ranges. • Low level protocol rules support filtering by MAC address. • Application rules have events for direct and indirect access to network. Indirect access details are also available. • New module for hash checking created. • Application, Process attack and Hash checking rules support wildcards in file paths. Logging subsystem • Log entries can be associated with rule. • Firewall can create rule based on log information. • New WELF-compatible text log format. WELF is supported by many log analyzers. • Improved log control. Changes in v.2.0.2.8 | 08-December-2008: - Visual Studio build process hangup fixed. - Hash calculation problem fixed. - Stateful ARP filtering imroved. - Process protection improved. - Registry monitoring improved. - New "change process privileges" process attack event introduced to control process privelege elevation. - Ukrainian translation created by Xa0c. - Language files updated. - Configuration template updated.
Rating:
2.5 out of 5 by Book123 |
Download Links | |
Server | Status |
---|---|
Direct Download Link 1 | Alive |
Direct Download Link 2 | Alive |
Click to Download from Uploading.com | Alive |
Click to Download from DepositFiles | Alive |
Other countries download it from Easy-Share. | Alive |
Buy This Book at Best Price >> |
Like this article?! Give us +1:
Related Articles
Technical Sygate Personal Firewall Pro Title: Sygate Personal Firewall ProDescription:The Best Firewall Ever!!!Links |