Welcome to中国防火墙网
Add to Favorites | Chinese
Jetico Personal Firewall
From;    Author:Stand originally
Software nature:[Freely software]

This is comprehensive and the individual network firewall that uses easily simply, it is OK and custom-built incident log, report, custom-built the firewall option that suits oneself. Very open and friendly module framework can make network safety is evaluated more simple.

Firewall of use Jetico individual you are OK:
1. is in connect the PC that you prevent when Internet gets the attack of hacker and baleful software.
Safety of drive of 2. use precaution is politic.
Safety of 3. editor defence is politic (for example: ? of δ of mildew of  of Gong of late bulbul anxious Bi washing with watercolors.
The defence security that 4. creates yourself is politic.
5. surveillance visits the applied process of Internet.
6. surveillance is chosen (or all) network data bag and network incident.

Three-layer defends:
I. Rock-bottom (network data bag filters) :  of arrive of  of Li of Hu Zhu  pushs coerce washing with watercolors to ask  dusk play ㄐ ? to parameter includes source address, destination location, port to wait. Such, jetico individual firewall can mix your PC suspect network news is kept apart. Adopt strategy of reasonable configuration defense, can the exploration that any hackers give out intercept (for example: SHieldsUp detects) , exploration result can show your computer is nonexistent, make your photograph invisible to the hacker.
II. Applied layer (network incident filters) : Suo carbuncle children's hair casts Internet of? of  of acetic miscellaneous instruct) , the join request that issues through all sorts of application processes. You can be restricted or intercept either network requests, if why don't you know this requests to want and send and receive data?
III. User layer (process activity filters) : It is OK that Qun of Mi of  of bake in a pan talks about leek Che to push Trojan horse of? of silk ribbon of Xie of Lu  a surname its baleful code infuse in your computer program, send your privacy other person or host. For example: Tip of sulphone of  line leek jumps over? of bend so as to breakstubborn of  of  of ⒋ of male bank of Yun of Cong of fade of basket of    .

Update time:File size of 2007-09-21:Developer of 3.21M:Software version of Jetico:Operating system of 2.0.0.35:Language interface of Win NT/2K/Win XPWin 2003VISTA:English