تبلیغات در اینترنت

تبلیغات در اینترنتگیفت کارت گوگل پلی
نمایش نتایج: از 1 به 1 از 1

موضوع: نســخه جدید فایروال Jetico Personal Firewall v2.1.0.8.2426

  1. Top | #1
    مدیر بازنشته

    تاریخ عضویت
    Jun 2010
    ورژن ویبولتین
    4
    سن
    20
    نوشته ها
    470
    مورد پسند
    866 بار
    اطلاعات
    میزان امتیاز
    68

    پیش فرض نســخه جدید فایروال Jetico Personal Firewall v2.1.0.8.2426


    Jetico Personal Firewall v2.1.0.8.2426 | 8.31 Mb


    Jetico Personal FirewallTM software protects computers against hackers and malicious software when networked or connected to the Internet. It offers detailed, configurable event logs, reports, plus the option to view and edit the firewall configuration. The modular architecture is as open as possible to assist with easier evaluation of the security.
    Jetico Personal Firewall Features:

    * Monitor running applications that access the network
    * Monitor selected/all network packets as well as selected network events
    * Choose a pre-defined Security Policy - the firewall rule set
    * Modify Security Policy to meet your needs
    * Make your own Security Policy

    Three Layers of Protection

    1. Low-level. (Network packet filter). This checks the validity of network packets and parameters such as source and destination addresses, protocol, etc. Using this process, Jetico Personal Firewall can make your computer invisible to untrusted networks. By selecting the Optimal Protection Policy, your computer becomes stealthy . Any security probing tests (for example, ShieldsUp! tests) by internet hackers will report that your computer does not exist.
    2. Application-level. (Network events filter). This checks and enables you to monitor network/internet connection requests made by applications. If you aren t sure why an application wishes to send or receive data from the Internet you can limit or block the activity.
    3. User-level. (Process activity filter). This notifies you of and prevents dirty tricks by Trojans and other malicious programs. A Trojan can inject its own code into programs on your computer and send data about you to a third party. For example, a Trojan in Internet Explorer could transmit details of your browsing preferences.

    New Features in Jetico Personal Firewall v.2
    System-related

    Jetico Personal Firewall v2 runs as privileged Windows service. It can protect computer before user logon.
    Native support for Windows XP Fast User Switching and Terminal Services.
    Jetico Personal Firewall supports Access Control Lists for all main functions. Administrator can configure ACL to grant access to particular firewall functions for any user or group.
    Windows XP Service Pack 2 Security Center support.
    User interface

    Improved rule editing interface.
    New popup message. The new look for popup dialog is presented. Popup message text and rule creation options can be modified.
    Firewall variables formerly controlled by Configuration Wizard, are integrated into main application window.
    Language file support for easy localization. All translatable words and phrases are taken from single UTF-8 encoded text file.
    Configuration

    New XML-based open configuration file format. Detailed documentation is available upon request.
    The new version maintains single protected firewall configuration for all users.
    Simplified controls for configuration.
    New hash handling scheme. Separate table for hash checking.
    Each firewall filtering layer has own root table.
    New automatic variables (per-connection) for local connections are supported.
    Firewall rules

    Rules support lists of parameters where possible.
    IP rules support IP address ranges.
    Low level protocol rules support filtering by MAC address.
    Application rules have events for direct and indirect access to network. Indirect access details are also available.
    New module for hash checking created.
    Application, Process attack and Hash checking rules support wildcards in file paths.
    Logging subsystem

    Log entries can be associated with rule.
    Firewall can create rule based on log information.
    New WELF-compatible text log format. WELF is supported by many log analyzers.
    Improved log control.


    Download Links

    Hotfile
    http://hotfile.com/dl/64259230/365b2...h_DMZ.rar.html

    کاربر مقابل از General Pouya بابت این پست مفید تشکر کرده است:





  2. گیفت کارت آیتونز

اطلاعات موضوع

کاربرانی که در حال مشاهده این موضوع هستند

در حال حاضر 1 کاربر در حال مشاهده این موضوع است. (0 کاربران و 1 مهمان ها)

موضوعات مشابه

  1. پاسخ: 28
    آخرين نوشته: 2013/09/07, 06:12 PM
  2. پاسخ: 9
    آخرين نوشته: 2013/05/16, 02:34 PM
  3. پاسخ: 0
    آخرين نوشته: 2011/10/11, 05:29 PM
  4. AVG 9.0 Build 663.1703 Pro With Working License Till 2020 + Plus Firewall
    توسط General Pouya در انجمن امنیتی
    پاسخ: 0
    آخرين نوشته: 2010/07/07, 03:46 AM

کلمات کلیدی این موضوع

علاقه مندی ها (Bookmarks)

علاقه مندی ها (Bookmarks)

مجوز های ارسال و ویرایش

  • شما نمیتوانید موضوع جدیدی ارسال کنید
  • شما امکان ارسال پاسخ را ندارید
  • شما نمیتوانید فایل پیوست کنید.
  • شما نمیتوانید پست های خود را ویرایش کنید
  •