织梦CMS - 轻松建站从此开始!

技术无忧网 - 技术从此无忧 -- 一站式中文IT技术网站 - www.tech51.net

当前位置: 主页>网络频道>防火墙>

Norman Personal Firewall功能简介

时间:2009-01-06 16:22来源: 作者: 点击:
Real-time protection against hackers and malicious web robots by filtering inbound and outbound traffic as well as alerting you of attempted attacks.  Two-way firewall filters both incoming and outgoing data traffic blocking external
  • Real-time protection against hackers and malicious web robots by filtering inbound and outbound traffic as well as alerting you of attempted attacks. 
  • Two-way firewall filters both incoming and outgoing data traffic blocking external machines trying to connect to the computer, as well as applications on the computer that are trying to connect to other systems on the network. 
  • Launcher protection that detects attempts from an application to launch itself through another application. 
  • Stealth launch protection that uncovers malicious applications attempting to access the Internet via other applications. The Personal Firewall keeps track of all parent applications. 
  • Process hijacking protection detects and reports trojans and spyware attempting to hijack legitimate applications by inserting malicious code. 
  • Full stealth mode that ensures that all ports on your computer are completely invisible from the outside. 
  • Antipharming is implemented through protection of the HOSTS file and therefore eliminates the most common pharming attack method. 
  • Self-protection prevents malware from terminatng the firewall. 
  • Installation wizard features an easy to use application that detects installed browsers, e-mail clients, and several other applications that require internet access, and automatically creates rules for the user. The setup wizard lets you decide your experience level, making it possible for advanced users to fine-tune their settings. 
  • Predefined rules includes a wide range of rules that cover most of the preinstalled applications and features in the Microsoft operating system, making it easy to install and use this security software. All predefined rules and configurations can be tuned by an experienced user through configuration options. 
  • Advanced svchost handling, where each svchost service has separate rules rather than one general rule to cover the grouping of services that each svchost.exe session can contain. 
  • Cooperative with other security software like antivirus and antispyware applications.
(责任编辑:admin)
织梦二维码生成器
顶一下
(0)
0%
踩一下
(0)
0%
------分隔线----------------------------
发表评论
请自觉遵守互联网相关的政策法规,严禁发布色情、暴力、反动的言论。
评价:
表情:
用户名: 验证码:点击我更换图片
栏目列表
推荐内容