Text1=Changing this setting will take effect after restarting Anti-Hacker
WMGroup=Firewall Mode
SafeMode=Maximum compatibility (recommended)
SafeModeText=This mode provides maximum compatibility with most network applications, but it might cause an increase in response time in some network games
FastMode=Maximum speed
FastModeText=This mode provides minimum network gaming response time, but it might cause conflicts between Stealth Mode and some network applications like file sharing network clients
;------------ FwZoneEdit ------------
[FwZoneEdit]
dlg_caption=Zone Properties
Text=Description:
Text1=Subnet address:
Text2=Subnet mask:
[FwZone_Group]
Trusted=Trusted
NetBIOS=Local network
Untrusted=Internet
Stealthed=Enable stealth mode
;------------ FwAppRuleEdit ------------
[FwAppRuleEdit]
dlg_caption=Edit Rules for $(AppName,objfile)
UseCmdLine=Command line
NameLabel=Application
Browse=$Browse
Preset=Preset...
PDMRule=Control application content
[FwAppRuleEdit.Dlg.AppList]
Name=Rule Name
;------------ FwRuleElementEdit ------------
[FwRuleElementEdit]
dlg_caption.new=New Rule
dlg_caption=Edit Rule
NameLabel=Rule name:
PropLabel=Properties:
ActionLabel=Additional action:
Warning=Display warning
Log=Log event
ahfwErrNeedApp=Please select the application that this rule will handle.
ahfwErrNeedProp=Please set values for the underlined bold items.
ahfwErrNeedRuleName=Please enter a name for the rule.
1=$(AppName,objfile) was $(Proto,FwBaloonMsg.AppEventDesc) the address $(RemoteHostName,FwRemAddr), in accordance with the user defined rule '$(RuleName)',\nthe remote port is $(RemotePort)\nthe local port is $(LocalPort)
0=The $(Direction,FwDirectionReport) $(Proto,ah_Notify_PacketProto) $(Direction,FwBaloonMsg.PacketDir) was $(IsBlocking,FwBlocked) in accordance with the user defined rule '$(RuleName)'$(Proto,FwBaloonMsg.PacketPorts)
[FwBaloonMsg.AppEventDesc.TCP.AllowIn]
1=blocked against accepting
0=allowed to accept
[FwBaloonMsg.AppEventDesc.TCP.AllowOut]
1=blocked against connecting to
0=allowed to connect to
[FwBaloonMsg.AppEventDesc.UDP.AllowIn]
1=blocked against receiving
0=allowed to receive
[FwBaloonMsg.AppEventDesc.UDP.AllowOut]
1=blocked against sending
0=allowed to send
[FwBaloonMsg.AppEventDesc.TCP]
$TCPAllowIn=$(IsBlocking,FwBaloonMsg.AppEventDesc.TCP.AllowIn) an incoming connection from
$TCPAllowOut=$(IsBlocking,FwBaloonMsg.AppEventDesc.TCP.AllowOut) an outgoing connection to
1=$TCPAllowIn
4=$TCPAllowIn
2=$TCPAllowOut
5=$TCPAllowOut
[FwBaloonMsg.AppEventDesc.UDP]
$UDPAllowIn=$(IsBlocking,FwBaloonMsg.AppEventDesc.UDP.AllowIn) an incoming UDP packet from
$UDPAllowOut=$(IsBlocking,FwBaloonMsg.AppEventDesc.UDP.AllowOut) an outgoing UDP packet to
1=$UDPAllowIn
4=$UDPAllowIn
2=$UDPAllowOut
5=$UDPAllowOut
[FwBaloonMsg.AppEventDesc]
06=$(Direction,FwBaloonMsg.AppEventDesc.TCP)
17=$(Direction,FwBaloonMsg.AppEventDesc.UDP)
[FwBaloonMsg.PacketPorts]
06=,\nthe remote port: $(RemotePort)\nthe local port: $(LocalPort).
17=,\nthe remote port: $(RemotePort)\nthe local port: $(LocalPort).
default=.
[FwBaloonMsg.PacketDir]
$PacketDirIn=from the remote address $(RemoteHostName,FwRemAddr) to the local address $(LocalHostName,FwLocAddr)
$PacketDirOut=from the local address $(LocalHostName,FwLocAddr) to the remote address $(RemoteHostName,FwRemAddr)
1=$PacketDirIn
4=$PacketDirIn
2=$PacketDirOut
5=$PacketDirOut
;------------- Network Monitor -----------
[AntiHackerStatisticsWindow]
dlg_caption=$Anti_Hacker Network Monitor
AppTab=Established Connections
PortsTab=Open Ports
HostsTab=Traffic
[AhStatApp]
ShowConnections=Show connections
ShowPorts=Show open ports
[AhStatApp.AppList]
App=Application
CmdLine=Command line
Proto=Protocol
Direction=Direction
LocalIP=Local address
LocalPort=Local port
RemoteIP=Remote address
RemotePort=Remote port
Duration=Duration
BytesRecieved=Received
BytesSent=Sent
[AhPortsTab.PortsList]
App=Application
CmdLine=Command line
Proto=Protocol
LocalIP=Local address
LocalPort=Port
Duration=Duration
[AhHostsTab.HostsList]
Host=Host
ip=IP address
BytesRecieved=Received
BytesSent=Sent
[AhStatApp.AppList.menu]
CreateRule=Create a rule
Disconnect=Drop this connection
;------------- Fw Common Sections -------------
[ShowUnknownIfEmpty]
<empty>=<unknown>
default=$(@)
[FwProtocols]
0=IP
1=ICMP
2=IGMP/RGMP
3=GGP
;4=IP in IP encapsulation
6=TCP
9=IGRP
17=UDP
47=GRE
50=ESP
51=AH
53=encrypted IP
default=unknown protocol ($(Proto))
[FwBlocked]
0=allowed
default=blocked
[FwAllowBlock]
0=Allow
default=Block
[FwAllowsBlocks]
0=allows
default=denies
[FwDirection]
1=in
2=out
3=both
4=in stream
5=out stream
[FwDirectionReport]
1=Inbound
2=Outbound
3=Both
4=Inbound
5=Outbound
[FwInOut]
1=Inbound
2=Outbound
3=Inbound & Outbound
4=Inbound (stream)
5=Outbound (stream)
[FwRuleEnabled]
0=<b>Rule is temporary disabled</b>.\n
[FwRuleLog]
0=$(Warning,FwRuleWarning)
1=$(Warning,FwRuleWarningWithLog)
[FwRuleWarning]
1=<b>The user will be notified when the rule is applied</b>.
[FwRuleWarningWithLog]
0=<b>The event will be logged when the rule is applied</b>.
1=<b>When the rule is applied the event will be logged and the user will be notified</b>.
[FwProtoConnection]
6=connection
default=packet
[FwZoneSeverity]
#Fw_fwnzTrusted=Trusted
#Fw_fwnzNetBIOS=Local network
#Fw_fwnzUntrusted=Internet
;------------- FWLevelGroup -----------
[FWLevelBlockAll]
HeaderText=Block All
BodyText=Prevent my computer from accessing\nthe Internet or local network.\nAll connection attempts will be blocked.
[FWLevelRejectNotFiltered]
HeaderText=High Security
BodyText=Block all connections\nnot permitted by the rules.\nThe training prompt will not appear.
[FWLevelAskUser]
HeaderText=Training Mode
BodyText=The training prompt appears if any\napplication attempts to connect to the local\nnetwork or the Internet.
[FWLevelAllowNotFiltered]
HeaderText=Low Security
BodyText=Allow network activity of all applications\nexcept those explicitly prohibited by\nuser-defined application rules.