Eight personal network firewall main function introduction

Source: Internet
Author: User
Tags firewall

"Guide" network such as rivers and lakes, everywhere hidden murderous, a little careless will recruit. Install a personal network firewall, you can reduce the threat of attack, let you rest assured that the net surf.

Introduction to Firewalls

The original meaning of the firewall originally refers to the ancient people's house built between the wall, this wall in the event of a fire can prevent spread to other houses. The firewall here, of course, does not refer to the physical firewall, but to the isolation between the local network and the external network of a defense system. It should be said that on the Internet firewall is a very effective network security model, through which you can isolate the risk area (that is, the Internet or a certain risk of the site) and the security zone (LAN or PC) connection. At the same time can monitor access to the network communication, so that safe access to information.

Eight big Firewalls

1, Proud Shield firewall

2, Agnitum Outpost Firewall

3, Goldtach Pro "gold ring"

4, Sygate Personal Firewall Pro

5, ZoneAlarm

6, Kaspersky Anti-hacker

7. Skynet Firewall

8, BlackICE PC Protection

First, proud Shield firewall (Figure 1)

Figure 1

Software small File

KfW Shield Firewall V1.0 build 1417 Person Edition

Software Type: Free Edition

Software platform: WIN98/ME/2000/XP

Software size: 2924 KB

Log in as administrator to install the KFW program after WINDOWS2000/XP, and then restart loading core program after completion. The first boot KfW will eject the Setup wizard, typically using the default settings.

1. Firewall Rule setting

Double-click the taskbar icon to eject the main interface, the KFW firewall has built-in 42 rules, including 20 standard security rules and 22 rules for the main Trojan program, these rules can ensure system security. Double-click any rule to edit it. KfW also provides 5 security levels, generally used in, advanced can, in addition, can also be based on online security conditions to dynamically set rules, such as the wave of virus in the Internet can be added to 5554, 1068, 445, such as the interception of ports.

2. Application rules

The KfW firewall can set rules for the application, which is useful against Trojans. Whenever a new program wants to access the Network, KfW pops up a confirmation box, which also controls the packets that are sent to and from the application, and sets the trace on the packet.

3, packet filtering and recording

The KFW firewall has professional-level package content logging capabilities to give you a deeper understanding of the structure of the various attack packs. Real-time packet address, type filtering can prevent Trojan intrusion and scan for dangerous ports. For example, filtering blue Code virus attack packets, but also to prevent the ICQ, QQ panic attacks.

4, Network Port list

The Network Ports List window for the KfW firewall lists all applications using network ports and the ports they use. In addition to the above features, the IP translation database can also display the corresponding geographic location of the IP address.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.