[
Sign my Guestbook] - [Read my Guestbook
]
[Guestbook by TheGuestBook.com]
Site up since 25th Apr. 2002 |
Links |
Kerio Personal Firewall Kerio Personal Firewall (KPF) is a software agent that builds a barrier between your personal computer and the Internet. KPF is designed to protect your PC against attacks from both the Internet, and other computers in the local network. KPF controls all data flow in both directions – from the Internet to your computer and vice versa, and it can block all attempted communication allowing only what you choose to permit. This makes KPF an ideal solution for notebook computers that freely travel in and out of the corporate network, facing exposure to various risks as they connect from different locations. Kerio Personal Firewall protects against information theft, modification or destruction Trojan horse applications spyware unauthorized access from within the local network denial of service attacks to applications or services Available FREE for home use. Business and institutional customers are encouraged to download this software for evaluation purposes. For Windows 98, Me, NT, 2000 and XP. NOTE: Windows 95 is no longer supported due to the termination of its support by its producer. Key Features Blocks all externally orginated IP traffic and drops the packets, rendering the desktop invisible to potential intruders. Three security settings for easy configuration; default setting sends alerts for all types of traffic. Permit or deny an indivdual incidence, or create permanent filter rules instantly. MD5 application signatures protect the computer from Trojan horses imitating trusted programs. Trusted address group option limits desktop access to known users or computers only. Opened Connections overview displays clearly what each application is doing at any given moment. Admin authentication keeps users from changing security policy on their own; KPF can be run as a service to ensure the computer is protected from startup. Encrypted remote administration allows, syslog reporting and configuration export allow for easy deployment of security settings to remote computers. |