• Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools

My AntiSpyware

Free antispyware software, Online Scanners, Instructions on how to remove spyware and malware.

Menu
  • Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools
Home › Free Software › Free Jetico Personal Firewall for Windows 98/ME/NT/2000/XP

Free Jetico Personal Firewall for Windows 98/ME/NT/2000/XP

Myantispyware team December 23, 2005     No Comment    

Free Jetico Personal Firewallis the most flexible free personal firewall for Windows,it`s offers detailed, configurable event logs, reports, plus the option to view and edit the firewall configuration. The modular architecture is as open as possible to assist with easier evaluation of the security.

Free Jetico Personal Firewall Features:

  • Protect your computer against hackers and malicious software when networked or connected to the internet.
  • Choose a pre-defined Security Policy.
  • Edit an existing Security Policy (i.e. the firewall rule set configuration).
  • Create your own Security Policy.
  • Monitor running applications that access the network.
  • Monitor selected/all network packets as well as selected network events.

Jetico Personal Firewall three-layer protection:

  • Low-level. (Network packet filter). This checks the validity of network packets and parameters such as source & destination addresses, protocol, etc. Using this process, Jetico Personal Firewall can make your computer invisible to a non-trusted network. By selecting the Optimal Protection Policy, your computer becomes “stealthy”. Any security probing tests (for example, ShieldsUp! tests) by internet hackers will report that your computer does not exist.
  • Application-level. (Network events filter). This checks and enables you to monitor network/internet connection requests made by applications. If you are not sure why an application wishes to send or receive data from the Internet you can limit or block the activity.
  • User-level. (Process activity filter). This notifies you of and prevents dirty tricks by Trojans and other malicious programs. (A Trojan can inject its own code into programmes on your computer and send data about you to a third party. e.g. a Trojan in Internet Explorer could transmit details of your browsing preferences.)

Jetico Personal Firewall total control over network events.

  • The user can view the list of critical network events in the firewall Log tab. For example, if the firewall rejects some dangerous network packet, a correspondent string appears in the list of logged events.
  • The user can evaluate all the network traffic that is under control of the firewall. Besides of this, the user can enhance a pre-defined firewall Policy set of rules. In the Configuration tab in the firewall interface you may notice a “tree” structure of the firewall rules set, created for the selected Policy. The user can add his/her own rules, view or edit existing rules or make firewall log events, correspondent to some firewall rules.
  • Jetico Personal Firewall performs Stateful Inspection of applications’ network activity. It means that the firewall examines the states of all internet connections, looking for the telltale signs of hacking, such as source routing or IP spoofing. Connections that exhibit these characteristics are dropped.

At the moment Jetico Personal Firewall detects and prevents the activity of malicious programs found in these test programs such as: AWFT, DNStest, Copycat, FireHole, Ghost, LeakTest, MBTest, Outbound, PCAudit, PCAudit2, Surfer, Thermit, TooLeaky, WallBreaker, Yalta and Yalta Advanced

Download Free Jetico Personal Firewall from here

Free Software

Author: Myantispyware team

Myantispyware is an information security website created in 2004. Our content is written in collaboration with Cyber Security specialists, IT experts, under the direction of Patrik Holder and Valeri Tchmych, founders of Myantispyware.com.

Leave a Reply Cancel reply




New Guides

Defense-fordesktop.com Click Allow Scam
Defense-fordesktop.com Virus Removal Guide
Searches.today Google Search results
How to get rid of Searches.today redirect from Chrome, Firefox, IE, Edge
Helllomedias.com Click Allow Scam
Helllomedias.com Virus Removal Guide
AccessibleSearchGuide mac app adware
How to uninstall AccessibleSearchGuide app/extension from Mac (Virus removal guide)
Link 2captcha Virus Click Allow Scam
Link 2captcha Virus (removal guide)

Follow Us

Search

Useful Guides

remove android virus
How to remove virus from Android phone
How to remove browser hijacker virus (Chrome, Firefox, IE, Edge)
DNSChanger
How to remove DNSChanger malware virus [Updated Apr. 2018]
How to reset Google Chrome settings to default
Iphone Calendar virus spam
Iphone Calendar Virus/Spam 2022 (Removal guide)

Recent Posts

Santa IM Worm
Symantec AV RAR library vulnerability
Panda Antivirus for Linux
CCleaner (Crap Cleaner) is a freeware system optimization and privacy tool
AD-Aware Update 19.12.2005

MYANTISPYWARE.COM

  • About Us
  • Contact Us
  • Privacy Policy

NEED A HELP ?

If you're seeing unwanted pop-ups or ads in your web-browser, you might have an adware installed on your computer. Use the following guide to stop pop-up ads and remove malicious software. Or ask for help here.

Links

  • Downloads
  • Instructions
  • Questions and Answers
  • Free Malware Removal Tools
Copyright © 2004 - 2022 Myantispyware.com - Free antispyware programs and Spyware Removal Instructions.