Keep your system airtight. A list of excellent firewalls in history

Source: Internet
Author: User
Tags mail new features pack resource versions firewall

In order to adapt to the user's complex environment and requirements, but also to have a "selling point", the firewall now generally has a lot of functions, these functions alone to see that there is no problem, such as the dual-machine hot standby function has passed the test, H.323 dynamic application support is also tested through, but in the actual environment, we may need to use the H.323 video conferencing in the case of dual-machine hot standby, and require a switch when the video is not interrupted, the possible firewall is not, and similar combination of functions is the user really need. In addition, the functionality and performance of the firewall are generally evaluated independently, functional testing and performance testing are divided into two parts, functional testing care about a single function, performance testing care about the performance of a simple two or three-layer application, resulting in functional performance "two layers of skin", can not really reflect the firewall capability: Testing performance is high, but many functions can not be used, In practice, when the commonly used features are turned on, performance becomes very low. Therefore, the performance and function evaluation must be combined to truly evaluate the firewall. The specific evaluation should start from the following aspects:

2~7 layer access control function, especially application layer depth filtering, should be able to use any combination of the following functions: address mapping, port mapping, VLAN trunk support, user authentication, dynamic packet filtering, flow control, etc.

The safety function, the emphasis is the anti-Synflood. Firewall as a single channel of the network, to ensure the security of the protected network, we need to focus on whether the security protection function can be in the filtering attack while ensuring normal access, whether to fake source address attacks and real source address attacks at the same time effective, can protect the server from impact. This function should be used in combination with address mapping, port mapping, VLAN trunk support, user authentication, dynamic packet filtering, flow control, etc.

Practical performance. Performance testing typically includes 6 main areas: throughput, latency, packet loss rate, back-to-back, concurrent connections, new connection rate. Practicality can be used to investigate the performance of the user in close proximity to real use;

New connection rate, because the network applications have a large volatility, that is, different time access to the characteristics of a large difference, requires a firewall can adapt to this situation, the corresponding consideration index is the new connection rate. Considering the complexity of user networks and applications, you also need to turn on common features such as packet filtering, content filtering, and attack resistance, in which case the new connection rate is tested. Here's a brief introduction to some of the best firewalls in history:

1.ZoneAlarm (ZA)--Highly recommended

This is the Zone Labs company launched a firewall and security protection software package, in addition to the firewall, it includes some personal privacy protection tools and pop-up advertising shielding tool. Compared to previous versions, new products can now support expert-level rule-making, it enables advanced users to have full control over network access, as well as a mail monitor that monitors every suspicious behavior that may be caused by a virus, and also reports on the actions of network intruders. In addition, ZoneAlarm Pro 4.5 retains the easy to use features of the previous versions, and even novice beginners can easily grasp its use.

Description

1, the installer will automatically find the installed ZoneAlarm Pro path.

2. If the language pack has already been installed, please quit ZA before installing it again. Otherwise, you will need to reboot after installation.

2, if not yet installed Za, after the installation of Za set up before the installation of the language pack can be, so that the future settings will be the Chinese interface.

3, ZA is based on the current system language settings to select the appropriate language pack, if the system language is set to English, the Chinese language pack will not be invoked.

4, the language pack does not change any original document, also applies to and 4.5.594.000 similar version. If necessary, you can revert to the English version after uninstalling.

5, there is a very small amount of English resources in the language pack does not, so can not be Chinese. For example, check the prompt window in the upgrade, and the "Port" in the alert message.

2. Proud Shield (KFW)--Highly recommended

The software is a complete knowledge of the copyright firewall, the use of the most advanced third-generation firewall technology "DataStream fingerprint Inspection" data stream fingerprint detection technology, and the enterprise firewall Check Point and Cisco the same, can detect the status of all layers in the network protocol, effectively block DOS, DDoS and other attacks, protect your server from the I nternet hackers and intruders attack, damage. Through the most advanced enterprise-class firewall technology, providing a variety of enterprise-class functions, powerful, complete, low prices, is currently the world's highest performance price of the network firewall products.

3.Kaspersky Anti-hacker (KAH)--General recommendation

Kaspersky Anti-hacker is a very excellent network security firewall produced by Kaspersky Company! and the famous anti-virus software AVP is the work of the same company! Protect your PC from hackers and intrusions, and protect your data securely! All network data access to the action will be prompted by it, access to the movement is released, you decide, can withstand from the internal network or internet hacker attacks!

4.blackice

The software won the PC Magazine Technology Excellence Award in 99, and experts commented that "BlackICE is an indispensable line of defense for home users without firewalls, and that it adds a layer of protection to the corporate network-it's not about replacing firewalls, Instead, it blocks intruders who attempt to cross the firewall. BlackICE Integration has a very powerful detection and analysis engine, can identify more than 200 kinds of intrusion techniques, to give you comprehensive network detection and system protection, it can also real-time monitoring network ports and protocols, interception of all suspected network intrusion, no matter how the hacker's ability to do their best to harm your system. It can also record the NetBIOS (WINS) name, DNS name, or IP address of the hacker you are trying to hack in order to take further action. After the use of the feeling, the software's sensitivity and accuracy is very high, stability is also very good, the system resource occupancy rate is very small, is the best choice for every friend on the Internet.

New features:

1. Add the application and communication control function bar in the setup

2. Can control whether the application is performed on the computer

3. What applications can be controlled to communicate with the Internet

4. Scan your system to detect all system settings change

5. Can record the occurrence of new software and new communication events in the event list

5.Agnitum Outpost Firewall (AOFW)

Agnitum Outpost Firewall is a short and short network firewall software, its function is similar PC software more powerful, even including advertising and image filtering, content filtering, DNS caching and other functions. It can prevent threats from cookies, ads, e-mail viruses, backdoor, spy software, decryption gurus, adware, and other Internet dangers. The software can be used without configuration, which is easy for many beginners. It is particularly noteworthy that this is the first firewall on the market that supports plug-ins so that its functionality can be easily extended. The software resource footprint is also very small. Outpost's other powerful features needless to say, you'll know when you try it yourself.

6.XELIOS Personal Firewall (XFW)

Compact, but powerful personal network firewall software. Can effectively defend against hacker and Trojan attack, has the powerful custom IP filtering rule function.

7.LockDown Millennium (LDM)--General recommendation

The best network security tool! Be able to clean up all the Trojan, can detect unknown Trojan, can kill mail virus, can prevent network bomb attack, can detect all access to the local machine and control them, can track the intruder, leave its evidence ... It's a native firewall, maybe stronger than that?

8.Intruder Alart 99--strongly recommended

Lockdown 2000 can prevent hacker programs, can prevent some conventional attacks such as Ne

Tbus, SubSeven ... The cleaner can clear the hacker program and prevent it from running. But in the face of new hacking software, such as glaciers ... $C (share C disk, such as homemade hacker software) and so on ... It has been powerless. Intruder Alart 99 to prevent any attack against you!

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.