NeT Firewall as Personal Firewall:

    NeT Firewall is inexpensive and easy to install and use personal firewall solution. It offers clearly explained configuration options, hides all ports to make your PC invisible to scans (Stealth security), protects your system from all external attacks, tracks all potential and actual threats, and would ensures nothing unauthorized entered your PC. NeT Firewall also monitors the state of each connection and compiles the information in a state table ensuring that the source and destination of each packet is valid.

                                                

    NeT Firewall does not provide application level firewall functionality (the majority of personal firewalls do). But what for you may need the application level firewall? If someone tries to persuade you that it protects you from Trojan software then don’t believe them. Windows provides a lot of different ways to hide Trojan application when it is already inside. This is a range of various methods from relatively simple injecting thread into the trusted process user space to rather complex implementation of the custom TCP/IP stack injected into the Windows kernel as a protocol or hooking driver. So, you’d better not trust application level firewall and keep an eye over Trojans using anti-virus software, or even better don’t start or open files which you can’t trust. Some of the application level firewalls also offer web advertisement blocking features, but since modern web browsers (an example Mozilla Firefox) already have this as a part of their functionality so there is no actual reason to do this twice (if course if you care of your system performance).

    Why is it easy-to-use? Usually after install you just need to set the required level of security for each network connection you use. For the majority of users it is recommended to use one of the Stealth modes. It does not limit your outgoing connections but protects your system from the majority of attacks through opened ports. If you need to allow others to access some of the local services running on your system (WWW-server, FTP-server, NetBIOS and etc.) then just create the required “ALLOW” rule. And of course you can always block undesired user by creating the “DENY” rule with his IP address. The Rules mechanism is very flexible and allows you to create about any possible network access permissions you may ever need.