Jetico Personal Firewall uses multiple level
The Jetico
- Protect computer from both inbound
- Choose a pre-defined Security Policy.
- Edit existing Security Policy.
- Create own Security Policy (i.e. the firewall
- Monitor running applications that access network.
- Monitor selected/all the network packets as well as selected network events.
Three Layers of Protection
* Low-level. (Network packet
* Application-level. (Network events filter). This checks and enables you to monitor network/
* User-level. (Process activity filter). This notifies you of and prevents dirty tricks by Trojans and other malicious programs. A Trojan can inject its own code into programs on yourcomputer and send data about you to a third party. For example, a Trojan in Internet Explorer could transmit details of your browsing preferences.
User interface
* Improved rule editing interface.
* New
* Firewall variables formerly controlled by Configuration Wizard, are integrated into main application window.
* Language file support for easy localization. All translatable words and phrases are taken from single UTF-8 encoded text file.
Configuration
* New XML-based open configuration file format. Detailed documentation is available upon request.
* The new version maintains single protected firewall configuration for all users.
* Simplified controls for configuration.
* New hash handling scheme. Separate table for hash checking.
* Each firewall filtering layer has own root table.
* New automatic variables (per-connection) for local connections are supported.
Firewall rules
* Rules support lists of parameters where possible.
* IP rules support
* Low level protocol rules support filtering by MAC address.
* Application rules have events for direct and indirect access to network. Indirect access details are also available.
* New module for hash checking created.
* Application, Process attack and Hash checking rules support wildcards in file paths.
Logging subsystem
* Log entries can be associated with rule.
* Firewall can create rule based on log information.
* New WELF-compatible text log format. WELF is supported by many log analyzers.
* Improved log control.
Download:
DOWNLOAD FROM HOTFILE
Mirror:
DOWNLOAD FROM RAPIDSHARE