home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Chip 2005 March
/
CMCD0305.ISO
/
Software
/
Shareware
/
Comunicatii
/
ntkernelfw
/
ntkernelfw_trial.exe
/
{app}
/
SIFrwlSnapIn.dll
/
2057
/
HTML
/
254
< prev
Wrap
Text File
|
2004-11-20
|
4KB
|
59 lines
<html>
<head>
<meta name="GENERATOR" content="Microsoft FrontPage 5.0">
<meta name="ProgId" content="FrontPage.Editor.Document">
<meta http-equiv="Content-Type" content="text/html; charset=windows-1252">
<title>New Page 1</title>
</head>
<body bgcolor="#FFFFFF">
<p>
<font face="Tahoma" size="2">
<img border="0" src="res://sifrwlsnapin.dll/#2/#271" width="172" height="42"></font></p>
<p class="MsoNormal"><font face="Tahoma" size="2"><b><span lang="EN-US">NeT
Firewall as Personal Firewall:</span></b></font></p>
<p class="MsoNormal"><font face="Tahoma" size="2">
<span lang="EN-US" style="color: black"> NeT Firewall is
inexpensive and easy to install and use personal firewall solution. It offers
clearly explained configuration options, hides all ports to make your PC
invisible to scans (Stealth security), protects your system from all external
attacks, tracks all potential and actual threats, and would ensures nothing
unauthorized entered your PC. NeT Firewall also monitors the state of each
connection and compiles the information in a state table ensuring that the
source and destination of each packet is valid.</span></font></p>
<p class="MsoNormal">
<img border="0" src="res://sifrwlsnapin.dll/#2/#274" align="center" width="262" height="157"></p>
<p class="MsoNormal"><font face="Tahoma" size="2"><span lang="EN-US">
NeT Firewall does not provide <b><i>application level firewall</i></b>
functionality (the majority of personal firewalls do). But what for you may need
the application level firewall? If someone tries to persuade you that it
protects you from Trojan software then donÆt believe them. Windows provides a
lot of different ways to hide Trojan application when it is already inside. This
is a range of various methods from relatively simple injecting thread into the
trusted process user space to rather complex implementation of the custom TCP/IP
stack injected into the Windows kernel as a protocol or hooking driver. So,
youÆd better not trust application level firewall and keep an eye over Trojans
using anti-virus software, or even better donÆt start or open files which you
canÆt trust. Some of the application level firewalls also offer web
advertisement blocking features, but since modern web browsers (an example
Mozilla Firefox) already have this as a part of their functionality so there is
no actual reason to do this twice (if course if you care of your system
performance).</span></font></p>
<p class="MsoNormal"><font face="Tahoma" size="2"><span lang="EN-US">
Why is it easy-to-use? Usually after install you just need to set the required
level of security for each network connection you use. For the majority of users
it is recommended to use one of the Stealth modes. It does not limit your
outgoing connections but protects your system from the majority of attacks
through opened ports. If you need to allow others to access some of the local
services running on your system (WWW-server, FTP-server, NetBIOS and etc.) then
just create the required ôALLOWö rule. And of course you can always block
undesired user by creating the ôDENYö rule with his IP address. The Rules
mechanism is very flexible and allows you to create about any possible network
access permissions you may ever need.</span></font></p>
<p class="MsoNormal"><font face="Tahoma" size="2"><b><span lang="EN-US"> </span></b></font></p>
</body>
</html>