beautyfarm - THE BEST DESIGN
DOWNLOAD MY MUSIK,participa la concursuri,soft-uri,cool stuff,NIKON CLUB,Baruri Trendy,ScreenSavers,Accesorii Cool,Masini sexy,Bannere,Games,Aparitii Cinematografice,Tribal Farm...etc distreaza-te!Totul pentru TINE.Cele mai tari subiecte.
Lista Forumurilor Pe Tematici
beautyfarm - THE BEST DESIGN | Inregistrare | Login

POZE BEAUTYFARM - THE BEST DESIGN

Nu sunteti logat.
Nou pe simpatie:
AlessyaDaniela
Femeie
24 ani
Bucuresti
cauta Barbat
25 - 50 ani
beautyfarm - THE BEST DESIGN / SOFT-URI / Jetico Personal Firewall 2.0.2.3.2255-free download descarca gratis  
Autor
Mesaj Pagini: 1
ADMIN-ELECTRIK_CAT
Administrator

Din: CAT LAND
Inregistrat: acum 18 ani
Postari: 8870
DESCARCA GRATIS PROGRAME FULL APPS :
SCARICA GRATIS PROGRAMMI COMPLETI :
SCARICAR FACILè :
libérez le téléchargement
geben Sie Download frei
libere la transferencia directa
descargar


Jetico Personal Firewall 2.0.2.3.2255
Jetico Personal Firewall software protects computer against hackers and malicious software when networked or connected to the Internet
With Jetico Personal Firewall you can:


* Monitor running applications that access the network.
* Monitor selected/all network packets as well as selected network events.
* Choose a pre-defined Security Policy — the firewall rule set.
* Modify Security Policy to meet your needs.
* Make your own Security Policy.


Three-layers protection

1. Low-level. (Network packet filter).

2. Application-level. (Network events filter).

3. User-level. (Process activity filter).

1. Low-level. (Network packet filter). This checks the validity of network packets and parameters such as source & destination addresses, protocol, etc. Using this process, Jetico Personal Firewall can make your computer invisible to a non-trusted network. By selecting the Optimal Protection Policy, your computer becomes "stealthy". Any security probing tests (for example, ShieldsUp! tests) by internet hackers will report that your computer does not exist.

2. Application-level. (Network events filter). This checks and enables you to monitor network/internet connection requests made by applications. If you are not sure why an application wishes to send or receive data from the Internet you can limit or block the activity.

3. User-level. (Process activity filter). This notifies you of and prevents dirty tricks by Trojans and other malicious programs. A Trojan can inject its own code into programmes on your computer and send data about you to a third party. e.g. a Trojan in Internet Explorer could transmit details of your browsing preferences.


System-related
Jetico Personal Firewall v2 runs as privileged Windows service. It can protect computer before user logon.
Native support for Windows XP Fast User Switching and Terminal Services.
Jetico Personal Firewall supports Access Control Lists for all main functions. Administrator can configure ACL to grant access to particular firewall functions for any user or group.
Windows XP Service Pack 2 Security Center support.


User interface
Improved rule editing interface.
New popup message. The new look for popup dialog is presented. Popup message text and rule creation options can be modified.
Firewall variables formerly controlled by Configuration Wizard, are integrated into main application window.
Language file support for easy localization. All translatable words and phrases are taken from single UTF-8 encoded text file.

Configuration
New XML-based open configuration file format. Detailed documentation is available upon request.
The new version maintains single protected firewall configuration for all users.
Simplified controls for configuration.
New hash handling scheme. Separate table for hash checking.
Each firewall filtering layer has own root table.
New automatic variables (per-connection) for local connections are supported.

Firewall rules
Rules support lists of parameters where possible.
IP rules support IP address ranges.
Low level protocol rules support filtering by MAC address.
Application rules have events for direct and indirect access to network. Indirect access details are also available.
New module for hash checking created.
Application, Process attack and Hash checking rules support wildcards in file paths.

Logging subsystem
Log entries can be associated with rule.
Firewall can create rule based on log information.
New WELF-compatible text log format. WELF is supported by many log analyzers.
Improved log control.

New in this version !

Inter-process communication monitoring improved on Vista systems.
Executable image hash is now checked on-demand for large files.
Bug in Security Center detection on Windows XP SP3 fixed.
Import/Export and Language menu item id collision fixed.
Brasilian, Russian and Turkish language files updated.

Size: 3.3 MB

Code:

Download Links 
http://w13.easy-share.com/1700435737.html
Or
http://rapidshare.com/files/116591855/JeticoPersFirewa2.0.2.2.2253.rar



_______________________________________
   PM-URI    №1
   TUTORIAL 3XFORUM
| REPORT BROKEN LINKS |

pus acum 16 ani
   
Pagini: 1  

Mergi la