Are you looking for a free security software? Kerio Personal Firewall (KPF) is undoubtedly a good choice. It can control the data exchange between its own computer and the computer on the network, protect your computer against attacks from users on the network. It provides four functions: network security, Private Information Protection, intrusion detection, and application integrity check, it can also shield unwanted advertisements, various scripts and controls, and protect users' computers from infringement from multiple angles. More importantly, it is easy to use and can be easily used without having to master too much knowledge.
Software name: Kerio Personal Firewall 4.1.0
Operating System: Win9x/ME, WinNT, Win2000, WinXP
Software: 5.69 MB
Download: http://www.mydown.com/soft/194/194050.html
Network Security Settings
In the default KPF rules, the security settings for the trust area are lower than those for the Internet. Generally, computers in the same LAN segment with you can be used as trust areas, because computers in the same CIDR block are usually colleagues in the organization, Data, printers, and applications need to be shared between computers, so security requirements are low. However, sometimes computers in the same CIDR block have security risks. For example, some others prefer illegal websites, causing Trojans or viruses to attack the entire LAN. In this case, you can reduce the scope of the Trust area. The steps for the scope of the Trust area of the facility are as follows:
1. Open the KPF settings window.
2. Select the Network Security label.
3. Select the Trusted area label.
4. Click the Remove button to delete the currently added trust area.
5. Click "Add" to bring up the "Zone definition" window. You can Add a trust domain in one IP address, IP address segment, or subnet.
The default rules of KPF include some basic protocol settings, including IGMP, ICMP, DNS, DHCP, and VPN, which usually do not need to be modified, you only need to check Enable predefined network security.
System Security Settings
In addition to upgrades and updates, applications are usually not changed. Some viruses and Trojans are started by attaching them to normal programs, even if the user finds that there is data sending behavior, it is considered as a normal program. After KPF is enabled, it automatically monitors the running of each program and supports MD5 verification of files. In this way, once you find that some programs open other programs, or even one byte change in the application, KPF will immediately notify the user.
Basic Rule settings
Basic Rule settings include three items:
1. When application is about to start: When the program starts.
2. When application has been modified: When the program is modified.
3. When application iS about tO launch another application: When the program needs tO call other programs.
If you have high requirements on computer security, you can choose from the above three options. Choose "Use existing system security rules Or askme (Use known system security rules Or ask users)". No matter which program is running, you must first ask whether the program can be run. Maybe you will think it is very troublesome to confirm every time you start the program. The "Starting application" window is displayed only when the program is started for the first time, select "Create a rulefor this event and don't ask me again (Create a rule for this event and no longer ask )"? Click the "Permit (allow)" button. The next time you run this program, there will be no more pop-up window to bother you.
More importantly, KPF has recorded the MD5 verification code of the program file, if the program is not modified. Then you can run it directly without confirmation, and once the program is modified, KPF will immediately find this change. At this time, you should be careful.
Intrusion Detection
Many Intruders use a variety of hacking tools to find and intrude machines with vulnerabilities. KPF's intrusion detection system can detect most of the current intrusion code and attacks. KPF divides the attack level into three hazard levels. You can choose different actions based on your needs. Click the "Details (Details)" button to obtain the attack types contained in each level. In this way, you can clearly understand who is using the attack method.