Jetico Personal Firewall 2.0.2.4
The Jetico Personal Firewall software allows the user:
- Protect computer from both inbound hackers' attacks from network as well as from unwished network access attempts performed by malicious software.
- Choose a pre-defined Security Policy.
- Edit existing Security Policy.
- Create own Security Policy (i.e. the firewall rule set configuration).
- Monitor running applications that access network.
- Monitor selected/all the network packets as well as selected network events.
New features in Jetico Personal Firewall v.2:
System-related
• Jetico Personal Firewall v2 runs as privileged Windows service. It can protect computer before user logon.
• Native support for Windows XP Fast User Switching and Terminal Services.
• Jetico Personal Firewall supports Access Control Lists for all main functions. Administrator can configure ACL to grant access to particular firewall functions for any user or group.
• Windows XP Service Pack 2 Security Center support.
User interface
• Improved rule editing interface.
• New popup message. The new look for popup dialog is presented. Popup message text and rule creation options can be modified.
• Firewall variables formerly controlled by Configuration Wizard, are integrated into main application window.
• Language file support for easy localization. All translatable words and phrases are taken from single UTF-8 encoded text file.
Configuration
• New XML-based open configuration file format. Detailed documentation is available upon request.
• The new version maintains single protected firewall configuration for all users.
• Simplified controls for configuration.
• New hash handling scheme. Separate table for hash checking.
• Each firewall filtering layer has own root table.
• New automatic variables (per-connection) for local connections are supported.
Firewall rules
• Rules support lists of parameters where possible.
• IP rules support IP address ranges.
• Low level protocol rules support filtering by MAC address.
• Application rules have events for direct and indirect access to network. Indirect access details are also available.
• New module for hash checking created.
• Application, Process attack and Hash checking rules support wildcards in file paths.
Logging subsystem
• Log entries can be associated with rule.
• Firewall can create rule based on log information.
• New WELF-compatible text log format. WELF is supported by many log analyzers.
• Improved log control.
Changes in v.2.0.2.4 | 30-June-2008:
- Firewall now creates backups prior to updating configuration file.
- More accurate "indirect access to network" detection.
- "Access to network" for large .exe files fixed.
- Truncated path in "access to network" events fixed.
- Kernel exception on fast user switch fixed.
- Protocol list in low level protocol module fixed.
Homepage - http://www.jetico.com
Size: 3.32 MB
DownloadLabels: Jetico Personal Firewall, Jetico Personal Firewall 2.0.2.4
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home