"Guide" network such as rivers and lakes, everywhere hidden murderous, a little careless will recruit. Install a personal network firewall, you can reduce the threat of attack, let you rest assured that the net surf.
Introduction to Firewalls
The original meaning of the firewall originally refers to the ancient people's house built between the wall, this wall in the event of a fire can prevent spread to other houses. The firewall here, of course, does not refer to the physical firewall, but to the isolation between the local network and the external network of a defense system. It should be said that on the Internet firewall is a very effective network security model, through which you can isolate the risk area (that is, the Internet or a certain risk of the site) and the security zone (LAN or PC) connection. At the same time can monitor access to the network communication, so that safe access to information.
Eight big Firewalls
1, Proud Shield firewall
2, Agnitum Outpost Firewall
3, Goldtach Pro "gold ring"
4, Sygate Personal Firewall Pro
5, ZoneAlarm
6, Kaspersky Anti-hacker
7. Skynet Firewall
8, BlackICE PC Protection
First, proud Shield firewall (Figure 1)
Figure 1
Software small File
KfW Shield Firewall V1.0 build 1417 Person Edition
Software Type: Free Edition
Software platform: WIN98/ME/2000/XP
Software size: 2924 KB
Log in as administrator to install the KFW program after WINDOWS2000/XP, and then restart loading core program after completion. The first boot KfW will eject the Setup wizard, typically using the default settings.
1. Firewall Rule setting
Double-click the taskbar icon to eject the main interface, the KFW firewall has built-in 42 rules, including 20 standard security rules and 22 rules for the main Trojan program, these rules can ensure system security. Double-click any rule to edit it. KfW also provides 5 security levels, generally used in, advanced can, in addition, can also be based on online security conditions to dynamically set rules, such as the wave of virus in the Internet can be added to 5554, 1068, 445, such as the interception of ports.
2. Application rules
The KfW firewall can set rules for the application, which is useful against Trojans. Whenever a new program wants to access the Network, KfW pops up a confirmation box, which also controls the packets that are sent to and from the application, and sets the trace on the packet.
3, packet filtering and recording
The KFW firewall has professional-level package content logging capabilities to give you a deeper understanding of the structure of the various attack packs. Real-time packet address, type filtering can prevent Trojan intrusion and scan for dangerous ports. For example, filtering blue Code virus attack packets, but also to prevent the ICQ, QQ panic attacks.
4, Network Port list
The Network Ports List window for the KfW firewall lists all applications using network ports and the ports they use. In addition to the above features, the IP translation database can also display the corresponding geographic location of the IP address.