First, Proud Shield firewall
Log in as administrator to install the KFW program after WINDOWS2000/XP, and then restart loading core program after completion. The first boot KfW will eject the Setup wizard, typically using the default settings.
1. Firewall Rule setting
Double-click the taskbar icon to eject the main interface, the KFW firewall has built-in 42 rules, including 20 standard security rules and 22 rules for the main Trojan program, these rules can ensure system security. Double-click any rule to edit it. KfW also provides 5 security levels, generally used in, advanced can, in addition, can also be based on online security conditions to dynamically set rules, such as the wave of virus in the Internet can be added to 5554, 1068, 445, such as the interception of ports.
2. Application rules
The KfW firewall can set rules for the application, which is useful against Trojans. Whenever a new program wants to access the Network, KfW pops up a confirmation box, which also controls the packets that are sent to and from the application, and sets the trace on the packet.
3, packet filtering and recording
The KFW firewall has professional-level package content logging capabilities to give you a deeper understanding of the structure of the various attack packs. Real-time packet address, type filtering can prevent Trojan intrusion and scan for dangerous ports. For example, filtering blue Code virus attack packets, but also to prevent the ICQ, QQ panic attacks.
4, Network Port list
The Network Ports List window for the KfW firewall lists all applications using network ports and the ports they use. In addition to the above features, the IP translation database can also display the corresponding geographic location of the IP address.
Second, Agnitum Outpost Firewall
Agnitum Outpost Firewall is a dapper network firewall software, it can from the system and application two levels, network connection, advertising, content, plug-ins, mail attachments and attack detection of multiple aspects of protection, prevention from Cookies, ads, e-mail viruses, backdoor , Spy software, decryption master, the harm of advertising software.
1. Application rules