PDA

نسخه کامل مشاهده نسخه کامل : آرشیو انواع فایروال



vtn54
03-08-2007, 12:15
با عرض سلام خدمت تمامی دوستان عزیز

بنا به پیشنهاد دوست عزیزمان Shahvand عزیز و برای جلوگیری از به هم خوردن نظم انجمن و سردرگمی کاربران عزیز

لطفا دوستان عزیز پس از این در این تاپیک آخرین نسخه انواع فایروال را معرفی کنند.لازم به ذکر است که این

تاپیک فقط برای معرفی این نرم افزارها بوده و لطفا دوستان بحثهای مربوط به انها را در تاپیک اختصاصی هر نرم افزار دنبال کنند .

با تشکر

vtn54

*Batman*
03-08-2007, 17:39
[ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ]


برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

Size=7.5 MB

Jalal
04-08-2007, 17:27
Ashampoo Firewall PRO v1.20
Ashampoo FireWall PRO is like a trusty watchdog standing guard at the entrance to your property. It is always alert and checks everything going in and out of your computer, keeping out unwanted intruders and preventing unauthorized access to the Internet from your computer. And despite its impressive power it is so simple to use – in Easy Mode you just click and go for full protection.


برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

Jalal
04-08-2007, 17:30
Iss Blackice Pc Protection

[ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ]

ISS BlackICE PC Protection/ Server Protection 3.6 cqd

BlackICE teams a personal firewall with an advanced intrusion detection system to constantly watch your Internet connection for suspicious behavior. BlackICE responds immediately by alerting you to trouble and instantly blocking the threat. BlackICE automatically detects and blocks attacks through a comprehensive inspection of all inbound and outbound information to your computer. And BlackICE PC Protection is constantly working to secure your dial-up, DSL, and cable modem from hackers 24 hours a day, every day of the year.
BlackICE's Application Protection quickly and invisibly defeats dangerous programs that attackers deliver through instant messaging, email, or even your Web browser! BlackICE stops these destructive programs before they do harm-like damaging your PC or launching email attacks against your friends and co-workers.



*** BlackICE PC Protection Guards and Secures Against:
- Theft of personal identity, passwords or credit card info and more?
- Hackers using your PC to launch attacks against other PC users
- Computer downtime and system crashes

*** BlackICE STOPS ATTACKERS COLD:
- BLOCKS hacker attacks instantly
- PREVENTS destructive applications like worms and Trojans from ever starting
- REPORTS attempted attacks and identifies intruders
- SECURES any Internet connection, including dial-up, DSL, or cable modem

*** BlackICE PC Protection is Powerful and Easy-to-Use:
- BlackICE teams a personal firewall with an advanced intrusion detection system to constantly watch your Internet connection for suspicious behavior. BlackICE responds immediately by alerting you to trouble and instantly blocking the threat.
- BlackICE PC Protection now features Application Protection, an exciting new feature designed to shield your PCs, laptops and workstations from hijack by an attacker, and protects you from Trojan horse applications, worms and other destructive threats.
- BlackICE's Application Protection quickly and invisibly defeats dangerous programs that attackers deliver through instant messaging, email, or even your Web browser! BlackICE stops these destructive programs before they do harm-like damaging your PC or launching email attacks against your friends and co-workers.
- BlackICE automatically detects and blocks attacks through a comprehensive inspection of all inbound and outbound information to your computer. And BlackICE PC Protection is constantly working to secure your dial-up, DSL, and cable modem from hackers 24 hours a day, every day of the year.

BlackICE PC Protection: Windows? 98, XP Home, XP Pro, 2000 Pro, Me, NT 4.0 Workstation
Download full :


برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

Jalal
04-08-2007, 17:32
Jetico Personal Firewall
jetico Personal Firewall protects your computer from unwanted hacker's attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity. Jetico Personal Firewall checks every packet that comes in or out of your computer. Using configuration sets for Security Policy you define how your computer is connected to the local network and the whole Internet. Your computer may be completely hidden from any unfriendly attempts to access your hard drive while you are able to access any web sites you want and you decide on which applications are allowed to access Internet and which are not. With Jetico Personal Firewall you feel secure, safe and protected while enjoying all Internet activities.

Changes in 23-April-2007, version 2.0.0.30:
- Rule update after group values change fixed.
- Rule reordering for copy/move operations fixed.
- Application rule parameters (local port, remote address) order corrected.
- Hash parameter handling bug fixed.
- Event log mesaages improved.
- IP rule parameters are displayed in the 'Misc' column.
- Configuration Wizard import function fixed.
- Chinese (simplified) translation contributed by Gao Xue Feng.


برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

Jalal
04-08-2007, 17:33
CA Personal Firewall2007 9.0.0.68

CA Personal Firewall provides complete, business-strength hacker and privacy protection. It stops hacker attacks, automatically delivers up-to-the-minute advice about which programs are safe and which are dangerous, blocks annoying pop-ups, controls cookies, and protects you against identity theft.


برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

Jalal
04-08-2007, 17:37
Sunbelt Kerio Personal Firewall V4.3.635.0

[ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ]
The Sunbelt Personal Firewall helps you control how your computer exchanges data with other computers on the Internet or local network. Even if you have a router that has a built-in firewall, you will still benefit from using Sunbelt Personal Firewall on your PC(s). It's the principle of "belt-and-suspenders" (being double-safe) which is a strongly recommended strategy to deal with these 'Internet Bad Guys'. The Sunbelt Personal Firewall also protects your PC from attacks initiated by other PC's on your network that might have been compromised.
Sunbelt Personal Firewall is a necessity for all desktop computers connected to broadband Internet, using DSL, cable, ISDN, WiFi or satellite modems. Within an organization, Kerio Personal Firewall prevents a single computer from attacks initiated by internal users. Remote workstations and laptops running KPF are protected from Internet born attacks. And if you have a notebook PC, you definitely should use the Sunbelt Personal Firewall on that notebook as well. Notebooks are especially easy to compromise because of built-in wireless access.

Potential intruders use various techniques to find out if your PC is vulnerable to attacks. These techniques vary from simply scanning all the entry points (called 'ports') of your computer to far more sophisticated methods. But the Sunbelt Personal Firewall has a built-in intrusion prevention system that identifies and blocks both known and unknown attacks so you can breathe easy and enjoy surfing the web. It really is an essential element of your Internet Safety.

F E A T U R E S of "Sunbelt Personal Firewall":
· Stop all traffic – stops all traffic on the computer. This function can be helpful especially when undesirable or strange network activity is detected. Traffic can be restored after the appropriate security actions are taken.
· Logging – Each firewall module creates an independent log that is stored in a text file. Logs can be viewed in a configuration dialog. Logs can also be stored on a Syslog server.
· Connections overview and statistics – The overview provides information about established connections and ports opened by individual applications. Information on the current speed and size of transmitted data in both directions is also provided for active connections. The overview is automatically refreshed in predefined time intervals. Statistics show users the number of objects blocked by the Web content filter and the number of detected intrusions during specific time periods.
· Automatic update – Regular checks are made for newer versions of the firewall. Whenever a new version is detected, users have the option of downloading and installing it. It is also possible to check for new versions manually

Changes in Version 4.3.635:
* Corrected issue in which registration fails when firewall is enabled.
* Significant improvement in network performance when web filtering is enabled.
* Enhanced Process Injection prevention to prevent code inject attempts into Windows system DLLs.
* Corrected numerous application crashes in the firewall service.
* Corrected various crashes in assist.exe
* Corrected issue in which setting password and checking for update does not cancel authentication form.
* Corrected issue in which binary data appeared in logs.
* Significant improvement in product stability.
[ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ] ([ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ])



برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

Persian.Boy
04-08-2007, 17:40
Shahvand جان فایروال Iss Blackice Pc Protection توسط شرکت Sunbelt خریداری شده و جای خودش رو به فایروال

Kerio Personal Firewall داده. یعنی از این به بعد فایروالی به اسم Iss Blackice Pc Protection وجود نخواهد داشت.

شما اگر به سایت Iss Blackice نیز مراجعه کنید متوجه خواهید شد که شرکت Sunbelt اوگوی خودش رو در پایین صفحه

قرار داده.

فکر کنم قراره تغییراتی در Kerio Personal Firewall انجام بشه. امیدوارم که این تغییرات بتونه کریو رو در مقابل

Leaktest ها قوی تر کنه. چون الان 2 تیم امنیتی کریو و Iss Blackice Pc Protection دارند بر روی این فایروال کار

میکنند.

اطلاعات بیشتر در سایت زیر...


برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

Jalal
04-08-2007, 17:41
Agnitum Outpost Firewall pro 4.0 build 1025/700/303

[ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ]

FirewallsOutpost Firewall Pro provides a superior arsenal of defense against PC infiltration. Outpost ensures your online security with solid protection against all internet-borne threats. Outpost is the first personal firewall developed with Open Architecture. It is also the first personal firewall that supports plug-ins. Sample plug-ins are included to show how this revolutionary technology can easily be employed for such tasks as Intrusion Detection, Advertisement Blocking, Content Filtering, E-mail Guard, and Privacy Control. It is equipped with every feature a personal firewall should have. It is the most functional firewall in the world. It supports all the latest security techniques and features such as: Full Stealth Mode, Anti-Leak, and MD5 Authentication.

Being online is fraught with dangers: Internet worms, spyware agents, Trojan horses, hijackers and more can wreak havoc, causing anything from slow performance to system crashes to full-blown identity theft. And to provide you with the kind of protection you need in these days of cyberthieves and online extortionists, your firewall must be able to monitor all inbound and outbound traffic and protect you from any unauthorized intrusion by rendering your PC invisible to anything that you haven’t authorized to see it.

Outpost Personal Firewall PRO Features:
[ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ]
*** Security.
- Detects all types of hacker attacks. The powerful Intrusion Detection System (IDS) built into Outpost protects your PC from both known and unknown types of hacker attacks. It screens inbound data and determines its legitimacy, either by comparing it against a set of known attack fingerprints or by performing behavior evaluation analysis.
- Protects all types of network connectivity. Outpost's Ethernet protection module protects network packets in transit — like chat sessions — from being hijacked. Such attacks can also disable or disrupt network connections and steal WiFi connectivity, so Outpost blocks any interference with network connectivity.
- Defeats all types of spyware infections. Outpost's Anti-Spyware module safeguards PCs against spyware infection and the loss of confidential information. Spyware is blocked at every possible stage — installation, activation, transmission of information and re-installation. Outpost's active spyware monitor makes sure no spyware can activate on your PC, by monitoring critical areas of the system and keeping them clean. The on-demand scanner scours the system for traces of deactivated spyware and erases them completely. Even if you disable active spyware protection during processor-intensive tasks like online games, new network connections are proactively verified in the background to be spyware-free before being allowed to proceed.
- Prevents all types of data theft. Outpost's comprehensive Anti-Leak function constantly monitors how your applications interact with one another, preventing malware programs from controlling trusted applications and accessing the network on their behalf. Anti-Leak protection guards against dozens of malware techniques designed to sneak personal data past the firewall's outbound sensors. And even if malware finds its way onto the system, it won't be able to transfer any data out of the network because the ID block function lets you define and lock down blocks of text, preventing them from being removed from the machine by any electronic means — IM, web access or email correspondence.
- Attachment quarantine. Attachment Quarantine protects you from the threat posed by accidentally opening email attachments that may contain viruses, worms or other malware and lets you customize which types of attachments Outpost should block.

*** Control.
- Network Activity Monitoring. Monitoring shows every connection between your machine and other computers on the Internet or LAN. It’s a handy tool to know what’s happening on a connected PC at any given time and to allow users to quickly stop unwanted Internet communications.
- Events Logging. The Log Viewer provides a detailed and complete history of computer activity, enabling you to review what's happened on a computer in the past or pinpoint a problem early on and correct it. Customized logging ensures you get only the information you want from Outpost, disregarding repetitive or irrelevant events. You can even configure exclusions for certain types of communications, such as NetBIOS or P2P traffic.
- Self-protection. Today's malware frequently seeks to shut down security software to simplify its infection process. Outpost 4.0 incorporates protection for all its components, making it impossible for anyone except the authorized user to disable or close Outpost protection.
- Packet/Application filtering. By implementing process-based data filtering, Outpost serves as a virtual checkpoint for incoming and outgoing application data. Based on certain common attributes or according to specific user instructions, it automatically configures how each particular application communicates over the LAN or the Internet. Through the use of these application access rules, any unauthorized program can easily be denied Internet access if the circumstances warrant it. Packet filtering is a lower-level filtering technique that lets you select which protocols, ports and remote addresses are allowed to be accessed from your PC.
- Adaptive firewall rules. Outpost Firewall Pro 4.0 includes macro definitions for applications, which enable you to manually define security rules for individual applications and Windows-based services. For example, you can now choose to limit DNS requests to the list of DNS services built into the network adaptor. If DNS is trying to reach an unlisted DNS server, you will be prompted to allow or block this action.
- support for 64-bit Windows. Outpost Firewall Pro now supports Windows XP 64-bit Edition and is fully compatible with the hardware and software environments of 64-bit computing.

*** Privacy.
- Identity shield. By customizing blocks of cookie files and external referral URLs, you can maintain a high level of privacy when you visit unfamiliar sites while still allowing trusted sites controlled access to personal information.
- Faster, cleaner surfing. Outpost Firewall Pro lets you limit the elements displayed on web pages, providing content control and faster page displays. You can define the sites that are permitted (or not permitted) to display images, rotate advertising or deliver pop-ups. In this way, any type of unwanted graphical or multimedia content can be restricted.
- Port stealthing. Being visible on the Internet is good only when whoever 'sees' your computer is authorized to do so. Outpost makes sure that your computer is hidden from unauthorized outsiders, protecting it against network probes and attempts to establish unauthorized communication channels..
- Content management. The built-in Content Management module lets you compile a list of words and phrases blocked from being displayed on web sites — a particularly valuable feature for parents who do not want their children exposed to inappropriate content.

*** Ease of Use.
- Effortless installation. Automatic installation takes care of the entire installation process, as well as the initial configuration, and is most suitable for less experienced users. The Installation Wizard, more suitable for users experienced with firewall installation and configuration, allows customization and the selection of specific operational parameters.
- ImproveNet service minimizes ruleset errors. ImproveNet is a network community that brings Outpost users and Agnitum engineers together to share configurations and enable everyone to benefit from Internet access security rules that are universally applicable. By participating in the ImproveNet service, users can adjust their application access rules to protect their most current applications against the latest threats. Because new rules are created and processed on a daily basis, you have access to a continuously updated set of access rules for the most popular Internet-enabled programs. You no longer need to manually create rule sets, the most common way to introduce vulnerabilities to the firewall protection.
- Entertainment mode for uninterrupted gameplay and video viewing. While you play games or watch videos on your PC, Outpost's Entertainment Mode ensures that the firewall won't interrupt you with connection questions, without sacrificing the level of protection. You can customize which applications will automatically activate Entertainment Mode.
- SmartAdvisor instant, context-sensitive help. When ImproveNet doesn't have the answer, SmartAdvisor is always on hand to help you make the right decision when configuring access information for an application.
- Automatic access rules. Outpost automatically configures the computer's network settings and protects it against unauthorized incoming Internet connections. Predefined rules for known applications are created automatically, so you don't need to manually create program access rules for frequently used applications.
- Easy program updates. When an update to Outpost is released, the program's update module automatically retrieves the latest version from the Agnitum server and applies it as soon as you authorize it to do so.

Changes in Outpost Firewall Pro 4.0 (build 1025/700/303), July 18, 2007:
The following issues are fixed (only significant ones are listed):
o More strict rules for DNS activity
o Automatic rules creation issue (active rules were disabled)
o Freezes on x64 platform

Download for x86:


برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

Jalal
05-08-2007, 22:06
Kerio.WinRoute.Firewall.v6.3.1.2906




Corporate & enterprise network firewall
[ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ]
Kerio WinRoute Firewall™ is a corporate gateway firewall for small and medium-sized businesses. Equipped with VPN, anti-virus protection, web filtering, reporting, and more, Kerio WinRoute Firewall provides a comprehensive network management and security solution.

Kerio WinRoute Firewall sets new standards in versatility, security and user access control. Designed for corporate networks, it defends against external attacks and viruses and can restrict access to websites based on their content.

Deep inspection firewall
Kerio WinRoute Firewall, certified by ICSA Labs in the Corporate Firewall category, includes detailed rule definition to perform stateful inspection and protocol inspection of all outgoing and incoming Internet traffic. A network rules wizard assists in the rapid setup of the firewall. Read more...

VPN, VPN Client & SSL VPN
Kerio's built-in SSL-based VPN server works in both client-to-server and server-to-server modes, allowing both branch offices and remote workers to securely connect to the corporate LAN. Clientless SSL VPN allows remote users to connect securely to the corporate network for file sharing from any computer with a browser and Internet connection. Read more...

Antivirus gateway protection
Kerio WinRoute Firewall provides optional virus scanning of inbound and outbound email, web traffic, and FTP transfers. In addition to a version with integrated McAfee Anti-Virus, there are several other anti-virus options to choose from. Read more...

Surf protection
The integrated (IBM) ISS Orange Web Filter option blocks users from accessing to up to 58 categories of web content, reducing legal liabilities for corporate and educational environments. Read more...

Content filtering
Kerio WinRoute Firewall offers a variety of content security features such as MP3 music download blocking, filtering for potentially dangerous executable files or blocking of annoying pop-up windows. The P2P Eliminator automatically detects and blocks peer-to-peer networks such as Kazaa. Read more...

User-specific access management
Each user in the network can be required to log in to Kerio WinRoute Firewall before connecting to the Internet. That allows for restrictive security and access policies to be applied based on the specific user, rather than the IP address. Transparent Active Directory support simplifies user account mapping to Windows domains, and an auto-add feature allows for creation of user-specific policies before users authenticate. Read more...

Fast Internet sharing
Support for DSL, cable modems, ISDN, satellite, dial-up or wireless Internet allows administrators to deploy Kerio WinRoute Firewall in networks of all sizes and in all locations. Users can share one Internet connection with fail-over to a backup connection. Administrators can use the Bandwidth Limiter to optimize the data throughput for business critical applications. Read more...

VoIP and UPnP support
Kerio WinRoute Firewall allows H.323 and SIP protocols to connect through it, eliminating the need to publicly expose the VoIP infrastructure to the Internet. Also, it integrates UPnP technology so that compliant applications such as MSN Messenger run instantly without requiring additional configuration at the firewall. Read more...

Reporting and administration
Well-arranged charts and statistics help spot problems and report usage habits. The administration console can be installed remotely to allow secure configuration from anywhere on the network. Every important event is reported to the administrator by email. Well-arranged charts and statistics help spot the problems and usage habits. Read more...


برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

Jalal
25-08-2007, 18:59
kaspersky anti-hacker 1.9 build 137 final

[ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ]

Kaspersky Anti-Hacker by Kaspersky Labs eliminates common firewall

woes with their anti-hacker control panel. Though the design is

simple, this firewall lets even beginers fine-tune protection

settings.

CODE

برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید


Pass:CODE
killer

Carl
28-08-2007, 14:01
PC Tools Firewall Plus v3.0.0.29 beta

PC Tools Firewall Plus is a powerful personal firewall for Windows® that protects your computer by preventing unauthorized users from gaining access to your computer through the Internet or a network. By monitoring applications that connect to the network Firewall Plus can stop Trojans, backdoors, keyloggers and other malware from damaging your computer and stealing your private information.

PC Tools Firewall Plus is advanced technology designed specially for people, not experts. Powerful prevention against attacks and known exploits is activated by default while experienced users can optionally create their own advanced packet filtering rules, including IPv6 support, to customize the network defenses. All you need to do is install it for immediate and automatic ongoing protection.

That's why PC Tools Firewall Plus provides world-leading protection, backed by regular Smart Updates, real-time protection and comprehensive network shielding to ensure your PC remains safe and hacker free. PC Tools products are trusted and used by millions of people every day to protect their home and business computers against online threats.

We recommend you use PC Tools Firewall Plus in combination with Spyware Doctor for comprehensive system protection against spyware, adware and other threats.

PC Tools Firewall Plus feature highlights
* Protects your PC as you are working, surfing and playing.
* Intelligent automatic protection without all the questions.
* Easy to use. Designed for both, novice and expert users.
* Advanced rules to protect your PC against common attacks.
* Best of all it’s FREE. No catches, limitations or time-limits.
* Platforms: Windows Vista™, XP and 2000

What’s new in PC Tools Firewall v3.0.0.29 beta:

* Stealth Mode - it is a feature that allows the computer to be totally "invisible". This can be enabled and disabled in the Settings, under Filtering Tab.
* Complete application analysis for TCP/UDP - A user only needs to allow an application (or specific connection for application) in order for the application to work without creating specific NDIS (Advanced) rules (like 2.0.0.x version).
* Introducing Expert User Mode - allows much more flexibility to fine tune application behavior:

This includes:

a. Creating specific rules for applications.
b. Analysis of DNS queries to allow users to specify FQDN in rules.

* Support for Anti Injection protection - will pass additional leak-tests.
* Provide more information about specific application connectivity in the Activity view:

a. All connection are specified.
b. For each application we show the traffic data that is sent/received.

* Complete stateful packet inspection (SPI) functionality.

HomePage:
برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

~Support Windows Vista、XP、20002003 server~

v3.0.0.29 beta:(Free~)

برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید
v2.0.0.25 Final:(Free~)

برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

Jalal
08-09-2007, 10:06
EnigmaFireWall

[ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ]

CODE

برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید
RAR password:
برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

sabasistem_co
08-09-2007, 22:13
سلام

اگه می شه یه فایروال برای McAfee VirusScan Enterprise 8.5 که با هم مچ باشند و از هم ایراد نگیرند و سرعت سیستم را پایین نیاورد ؟

لطفا کمک کنید

Viren
09-09-2007, 01:20
سلام

به نظر من Kaspersky Anti Hacker انتخاب خوبیه

Jalal
11-09-2007, 20:38
Agnitum Outpost Firewall pro 4.0 build 1025/700/303
[ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ]

FirewallsOutpost Firewall Pro provides a superior arsenal of defense against PC infiltration. Outpost ensures your online security with solid protection against all internet-borne threats. Outpost is the first personal firewall developed with Open Architecture. It is also the first personal firewall that supports plug-ins. Sample plug-ins are included to show how this revolutionary technology can easily be employed for such tasks as Intrusion Detection, Advertisement Blocking, Content Filtering, E-mail Guard, and Privacy Control. It is equipped with every feature a personal firewall should have. It is the most functional firewall in the world. It supports all the latest security techniques and features such as: Full Stealth Mode, Anti-Leak, and MD5 Authentication.

Being online is fraught with dangers: Internet worms, spyware agents, Trojan horses, hijackers and more can wreak havoc, causing anything from slow performance to system crashes to full-blown identity theft. And to provide you with the kind of protection you need in these days of cyberthieves and online extortionists, your firewall must be able to monitor all inbound and outbound traffic and protect you from any unauthorized intrusion by rendering your PC invisible to anything that you haven’t authorized to see it.

Outpost Personal Firewall PRO Features:

*** Security.
- Detects all types of hacker attacks. The powerful Intrusion Detection System (IDS) built into Outpost protects your PC from both known and unknown types of hacker attacks. It screens inbound data and determines its legitimacy, either by comparing it against a set of known attack fingerprints or by performing behavior evaluation analysis.
- Protects all types of network connectivity. Outpost's Ethernet protection module protects network packets in transit — like chat sessions — from being hijacked. Such attacks can also disable or disrupt network connections and steal WiFi connectivity, so Outpost blocks any interference with network connectivity.
- Defeats all types of spyware infections. Outpost's Anti-Spyware module safeguards PCs against spyware infection and the loss of confidential information. Spyware is blocked at every possible stage — installation, activation, transmission of information and re-installation. Outpost's active spyware monitor makes sure no spyware can activate on your PC, by monitoring critical areas of the system and keeping them clean. The on-demand scanner scours the system for traces of deactivated spyware and erases them completely. Even if you disable active spyware protection during processor-intensive tasks like online games, new network connections are proactively verified in the background to be spyware-free before being allowed to proceed.
- Prevents all types of data theft. Outpost's comprehensive Anti-Leak function constantly monitors how your applications interact with one another, preventing malware programs from controlling trusted applications and accessing the network on their behalf. Anti-Leak protection guards against dozens of malware techniques designed to sneak personal data past the firewall's outbound sensors. And even if malware finds its way onto the system, it won't be able to transfer any data out of the network because the ID block function lets you define and lock down blocks of text, preventing them from being removed from the machine by any electronic means — IM, web access or email correspondence.
- Attachment quarantine. Attachment Quarantine protects you from the threat posed by accidentally opening email attachments that may contain viruses, worms or other malware and lets you customize which types of attachments Outpost should block.

*** Control.
- Network Activity Monitoring. Monitoring shows every connection between your machine and other computers on the Internet or LAN. It’s a handy tool to know what’s happening on a connected PC at any given time and to allow users to quickly stop unwanted Internet communications.
- Events Logging. The Log Viewer provides a detailed and complete history of computer activity, enabling you to review what's happened on a computer in the past or pinpoint a problem early on and correct it. Customized logging ensures you get only the information you want from Outpost, disregarding repetitive or irrelevant events. You can even configure exclusions for certain types of communications, such as NetBIOS or P2P traffic.
- Self-protection. Today's malware frequently seeks to shut down security software to simplify its infection process. Outpost 4.0 incorporates protection for all its components, making it impossible for anyone except the authorized user to disable or close Outpost protection.
- Packet/Application filtering. By implementing process-based data filtering, Outpost serves as a virtual checkpoint for incoming and outgoing application data. Based on certain common attributes or according to specific user instructions, it automatically configures how each particular application communicates over the LAN or the Internet. Through the use of these application access rules, any unauthorized program can easily be denied Internet access if the circumstances warrant it. Packet filtering is a lower-level filtering technique that lets you select which protocols, ports and remote addresses are allowed to be accessed from your PC.
- Adaptive firewall rules. Outpost Firewall Pro 4.0 includes macro definitions for applications, which enable you to manually define security rules for individual applications and Windows-based services. For example, you can now choose to limit DNS requests to the list of DNS services built into the network adaptor. If DNS is trying to reach an unlisted DNS server, you will be prompted to allow or block this action.
- support for 64-bit Windows. Outpost Firewall Pro now supports Windows XP 64-bit Edition and is fully compatible with the hardware and software environments of 64-bit computing.

*** Privacy.
- Identity shield. By customizing blocks of cookie files and external referral URLs, you can maintain a high level of privacy when you visit unfamiliar sites while still allowing trusted sites controlled access to personal information.
- Faster, cleaner surfing. Outpost Firewall Pro lets you limit the elements displayed on web pages, providing content control and faster page displays. You can define the sites that are permitted (or not permitted) to display images, rotate advertising or deliver pop-ups. In this way, any type of unwanted graphical or multimedia content can be restricted.
- Port stealthing. Being visible on the Internet is good only when whoever 'sees' your computer is authorized to do so. Outpost makes sure that your computer is hidden from unauthorized outsiders, protecting it against network probes and attempts to establish unauthorized communication channels..
- Content management. The built-in Content Management module lets you compile a list of words and phrases blocked from being displayed on web sites — a particularly valuable feature for parents who do not want their children exposed to inappropriate content.

*** Ease of Use.
- Effortless installation. Automatic installation takes care of the entire installation process, as well as the initial configuration, and is most suitable for less experienced users. The Installation Wizard, more suitable for users experienced with firewall installation and configuration, allows customization and the selection of specific operational parameters.
- ImproveNet service minimizes ruleset errors. ImproveNet is a network community that brings Outpost users and Agnitum engineers together to share configurations and enable everyone to benefit from Internet access security rules that are universally applicable. By participating in the ImproveNet service, users can adjust their application access rules to protect their most current applications against the latest threats. Because new rules are created and processed on a daily basis, you have access to a continuously updated set of access rules for the most popular Internet-enabled programs. You no longer need to manually create rule sets, the most common way to introduce vulnerabilities to the firewall protection.
- Entertainment mode for uninterrupted gameplay and video viewing. While you play games or watch videos on your PC, Outpost's Entertainment Mode ensures that the firewall won't interrupt you with connection questions, without sacrificing the level of protection. You can customize which applications will automatically activate Entertainment Mode.
- SmartAdvisor instant, context-sensitive help. When ImproveNet doesn't have the answer, SmartAdvisor is always on hand to help you make the right decision when configuring access information for an application.
- Automatic access rules. Outpost automatically configures the computer's network settings and protects it against unauthorized incoming Internet connections. Predefined rules for known applications are created automatically, so you don't need to manually create program access rules for frequently used applications.
- Easy program updates. When an update to Outpost is released, the program's update module automatically retrieves the latest version from the Agnitum server and applies it as soon as you authorize it to do so.

Changes in Outpost Firewall Pro 4.0 (build 1025/700/303), July 18, 2007:
The following issues are fixed (only significant ones are listed):
o More strict rules for DNS activity
o Automatic rules creation issue (active rules were disabled)
o Freezes on x64 platform

Download for x86:

CODE

برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنیدDownload for x64:

CODE

برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

WooKMaN
12-09-2007, 21:54
Mcafee Firewall v8.5 Corporate Edition FINAL

لينك مستقيم :


برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

بدون پسورد

6.3MB

x_2007
16-09-2007, 20:11
Look 'n' Stop v2.06 Firewall Final



This package contains:

Look 'n' Stop v2.06 Firewall Final Setup

Look 'n' Stop v2.06 Firewall Final Patch -Unreal RCE

Phant0m``s Look 'n' Stop Ruleset v8.0

Phant0m``s Look 'n' Stop Ruleset v8.0.Keygen-ICU



[ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ]

Direct Link=977KB


برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

Jalal
18-09-2007, 12:32
Sygate Personal Firewall Pro 5.5

[ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ]

QUOTE
Sygate Personal Firewall is more than an advanced, user-friendly personal firewall, it's a bi-directional intrusion defense system. It ensures your personal computer is completely protected from malicious hackers and other intruders while preventing unauthorized access from your computer to a network. In essence, it makes your protected machines invisible to the outside world. That makes it a must-have security measure for any PC that connects to a private network or the public Internet. Once you've been compromised, every other network you connect to is at risk; including your home, business and online bank accounts. No matter where you use your computer, whether remote or behind a corporate firewall, whether dial-up or an always-on broadband Internet connection, it gives you complete confidence that your precious business, personal, financial and other data is safe and secure. If that isn't enough, it includes advanced active-scan vulnerability assessment to pinpoint your weaknesses and fine-tune your security policy.

[ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ]
CODE

برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید
RAR password:
برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

Jalal
18-09-2007, 12:35
McAfee Personal Firewall Plus 6

[ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ]

QUOTE
Protect yourself while online with the advanced security of McAfee® Personal Firewall Plus. Easy-to-use, yet highly secure, McAfee Personal Firewall Plus safeguards your PC's connection to the Internet whether you connect via DSL, cable modem, satellite, or dial-up. McAfee Personal Firewall Plus gives you the powerful tools to both control and monitor communication in and out of your PC.

[ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ]
CODE

برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید
RAR password:
برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

ahmmahdi
18-09-2007, 12:58
سلام
بابا دست خوش این ZoneAlarm که نسخه 5.0 مرد حسابی!!
این لینک دانلود مستقیم آخرین نسخه این نرم افزار بسیار قدرتمند که من 4 سال متمادی با اون کار می کنم و بسیار هم ازش راضی هستم از سرور قدرتمند ***********

برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید
پسورد:
برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

ahmmahdi
18-09-2007, 13:00
به جای * بنویسید ***********

ahmmahdi
18-09-2007, 13:04
آقا این سایت ظاهرا نمی ذاره من اسم سایت رو بنویسم
مجبورم عکسش رو بذارم
[ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ]***********.com/up/files/1/image/soft/zonealarm.jpg

ahmmahdi
18-09-2007, 13:07
پسورد :
برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید سی دانلود.com
البته به انیلیسی

x_2007
19-09-2007, 00:00
WinRoute Firewall v6.4.0.3176



WinRoute Firewallيک دروازه گروهی است که به صورت ديوار آتشين عمل می کند، اين نرم افزار برای کارهای کوچک و متوسط ساخته شده است.اين نرم افزار خود را برای سرورهای شخصی مجهز کرده است، اضافه کردن دلبخواهی McAfee Anti-Virus و ديگر امکانات، جزوی از کاربردهای اين نرم افزار می باشد.نام اين نرم افزار از چندين سال پيش به عنوان يک ديوار آتشين فعال و بسيار قدرتمند مشهور شده بود




برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

*Batman*
19-09-2007, 03:33
پیرو پست قبلی (25) :

Patch + Keygen برای WinRoute Firewall (نسخه 6.4 )




برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

1795
20-09-2007, 11:16
با سلام
لطفا به طور صريح توضيح بديد كه يك فايروال دقيقا چكاري انجام ميدهد و فرقش با انتي ويروس چيه. با تشكر

Jalal
20-09-2007, 11:21
با سلام
لطفا به طور صريح توضيح بديد كه يك فايروال دقيقا چكاري انجام ميدهد و فرقش با انتي ويروس چيه. با تشكر


فایروال ( firewall ) چیست؟

یک فایروال از شبکه شما در برابر ترافیک ناخواسته و همچنین نفوذ دیگران به کامپیوتر شما حفاظت می کند. توابع اولیه یک فایروال به این صورت هستند که اجازه می دهند ترافیک خوب عبور کند و ترافیک بد را مسدود می کنند! مهمترین قسمت یک فایروال ویژگی کنترل دستیابی آن است که بین ترافیک خوب و بد تمایز قائل می شود.

وقتی آن را نصب می کنید فایروال بین کامپیوتر شما و اینترنت قرار می گیرد. فایروال به شما اجازه می دهد صفحات وب را ببینید و به آنها دسترسی داشته باشید، فایل download کنید، چت کنید و ... . در حالیکه مطمئن هستید افراد دیگری که در اینترنت مشغول هستند نمی توانند به کامپیوتر شما دست درازی کنند. بعضی از فایروالها نرم افزارهایی هستند که روی کامپیوتر اجرا می شوند اما فایروالهای دیگر به صورت سخت افزاری ساخته شده اند و کل شبکه را از حمله مصون می کنند.

هر کسی که از اینترنت استفاده می کند باید از بعضی از انواع فایروالها استفاده کند. برنامه هایی هستند که می توانند از اینترنت download شوند این برنامه ها می توانند تعداد زیادی آدرسهای IP آسیب پذیر برای نفوذ را پیدا می کنند این برنامه ها به راحتی download شده و اجرا می شوند و برای سوء استفاده یا مشکل دار کردن کامپیوتر شما از طریق این برنامه ها احتیاجی به دانش شبکه نیست معمولاً همه انواع فایروالها از شما در برابر این حملات حفاظت می کنند.

فایروالهای نرم افزاری

فایروالهای نرم افزاری برنامه هایی هستند که خود را بین درایو کارت شبکه (یا مودم) و کامپیوتر شما قرار می دهند. آنها حملات را قبل از اینکه حتی سیستم شما آن را تأیید کند قطع می کنند. تعداد زیادی فایروالهای مجانی از این نوع روی اینترنت وجود دارند. در این در اینجا چند لینک برای download فایروال وجود دارد.

فایروال NAT ساده

فایروالهایی که برای broadband router ها ساخته شده اند و نرم افزارهایی مانند Microsoft ICS فایروالهای بسیار ساده ای هستند. و این فایروالها شبکه را با جلوگیری از ارتباط مستقیم هر کامپیوتر با کامپیوترهای دیگر شبکه محافظت می کنند. این نوع فایروالها تقریباً هر نوع هکری را متوقف می کنند. هکرهای حرفه ای ممکن است بتوانند از این فایروالها عبور کننداما تعداد چنین اشخاصی کم و احتمال آن ضعیف است.

فایروالهای با ویژگی stateful packet inspection

نسل جدید فایروالهای خانگی stateful packet inspection نامیده می شوند. این یک شکل پیشرفته از فایروال است که هر پاکت اطلاعاتی را که از فایروال عبور می کند بازرسی می کند. فایروال هر پاکت اطلاعاتی را برای ردیابی هر نوعی از هک اسکن می کند.بیشتر افراد هرگز با این نوع حمله ها روبرو نمی شوند اما نواحی در اینترنت وجود دارند که بیشتر مورد حمله هکرهای حرفه ای واقع می شوند.

فایروال ها چگونه کار می کنند؟
کامپیوتر خود را رویین تن کنید
اگر مدت زیادی است با اینترنت سروکار دارید،به احتمال زیاد لغت فایروال(firewall)برایتان آشناست.فایروال درست مثل دیواره ای که مانع گسترش آتش از قسمتی به قسمت دیگر می شود،عمل می کند وازهجوم انواع خطرات به شبکه محلی شما و یا کامپیوتر متصل به اینترنت جلو گیری می کند.به زبان ساده یک فایروال یک برنامه با یک قطعه سخت افزاری است که در محل اتصال شبکه شما به اینترنت قرار میگیردو اطلاعاتی را که میان رایانه های شما و اینترنت رد و بدل می شود، کنترل می کند.برای اینکه با لزوم استفاده از فایروال آشنا شوید،فرض کنید شبکه شما بدون استفاده از فایروال به اینترنت وصل شود.در این صورت هر کسی می تواند به آسانی به هریک از رایانه هایتان دست یابد،آنرا بررسی و با آن اتصالFtpیاTelnetبر قرارکند،در آن صورت فکرش را بکنید که شبکه شما چه وضعی پیدا خواهد کرد.ولی با نصب فایروال در محل مناسب،اوضاع کاملا عوض می شود.در این صورت شما می توانید با تنظیم فیلترهای فایروال،قوانین مورد نظر خود را روی شبکه تان اعمال کنید.تعیین کنید که کاربران شبکه شما میتوانند به چه سایت هایی وصل شوندواجازه دارند چه فایل هایی را به اینترنت بفرستند ودریافت کنند.به این ترتیب براحتی میتوانید رایانه تان را مدیریت کنید.حالکه اهمیت فایروال روشن شد،به تنظیمات آن می پردازیم.فایر وال قابل تنظیم است،یعنی شما می توانید به تناسب کارتان و انتظاری که ازآن دارید فیلترهایی را به آن اضافه یا کم کنید.این که فایروال هنگام عبور دادن اطلاعات از خودش،به چه نوع اطلاعاتی توجه کند و کدام نوع آن را بررسی کرده و جلویعبور آنها را بگیرد،به نظر شما بستگی دارد.می توانید با تنظیم هر کدام از موارد زیر به فایروال دیکته کنیدکه چطور عمل کند:
1)نشانی IP:اگر هنگام اداره شبکه محلی خود متوجه شدید که رایانه ای از طریق اینترنت مرتبت بهserver شبکه شما وصلمیشود و بار ترافیکی زیادی ایجاد می کند،می توانید از فایروال خود بخواهید که به آن رایانه یا نشانی IP مشخص،اجازه ورودبه شبکه را ندهد.
2)نام حوزه (Domain name):از آنجا که نشانیIP یک عدد 32بیتی و استفاده از آن راحت نیست،به همه serverها در اینترنت علاوه بر نشانی IP یک نام حوزه اختصاص میدهند.شما می توانید فایروال را طوری تنظیم کنید که رایانه های شبکهمحلی بتواند به سایت های خاصی (با نشانی حوزه خاص)دسترسی داشته باشند. یا اینکه به مشخص کردن نام حوزه در فایروالبه رایانه های شبکه تان اجازه بدهید که از آن سایت ها دیدن کنند.
3)پورت و پروتکل:فایروال می توانداز طریق شماره پورت های رایانه ها که برای ارتباط با یکدیگر به کار می برند،اطلاعاترد و بدل شده را کنترل کند،همچنین می توان کلمات واصطلاحات خاصی را در بانک اطلاعاتی فایروال مشخص کرد. در اینصورت هنگام وارد یا خارج شدن اطلاعات فایروال محتوای آنها را بررسی می کند و اگر با کلمات خاصی که برایش مشخصکرده ایم روبه رو شود،اجازه نمی دهد آن اطلاعات عبورکنند.
فایروال در برابر چه خطراتی از ما محافظت می کنند؟
1)ویروس ها:از معمول ترین خطرات برای هر رایانه به حساب می آیند و معمولا برنامه های کوچکی هستند که خود را رویرایانه های دیگر کپی کرده و به این روش به سرعت در شبکه شما پخش می شوند.
2)اشکالات برنامه ها و سیستم عامل ها:در بعضی برنامه ها امکان دسترسی به آن برنامه از راه دور (Backdoor)آن همبدون امنیت کافی فراهم شده است.به این ترتیب هکرها می توانند از آن استفاده کرده واز راه دور کنترل برنامه شمارا بدستبگیرند.
3)ماکرو ها:اگر فایروال ورود وخروج اطلاعات را کنترل نکند.هکرها میتوانند با فرستادن قطعه برنامه ها(که ماکرو نام دارند)به رایانه ها،داده ها را پاک کنند یا تغییر دهند و کل شبکه را از کار بیندازند.
4)بمب های ایمیل:در یک لحظه یک نامه صدها و هزاران بار برای یک سرویس دهنده نامه الکترونیکی فرستاده می شود وکاراو را مختل می کند تا جایی که این سیستم دیگر نمی تواند نامه ها را دریافت کند و از کار می افتد.
5)در بسیاری از مواردی که به سایت ها حمله می شود،هکرها برای وصل شدن به server،سعی می کنند درخواست هایبی شماری برای سرور بفرستد به طوری که سرور نمی تواند سیستم درخواست دهنده را پیدا کند و گیج می شود،به این ترتیبوقتی تعداد این نوع در خواست ها زیاد باشد،server کند میشود در نهایت از کار می افتد.هر فایروال با توجه به سطح امنیتیکه ایجاد می کند،می تواند در مقابل تعدادی از این خطرات از شبکه ما محافظت کند.

[ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ]

:46:

Carl
21-09-2007, 00:00
Jetico Personal Firewall v2.0.0.35


Jetico Personal Firewall uses multiple level filtering scheme to provide highest protection level. Jetico Personal Firewall outperformed Zone Alarm, Outpost and other well known products in independent tests:
Matousec.com personal firewall test results.
Firewallleaktester.com personal firewall test results

Flexible configuration
Jetico Personal Firewall is unique rule based firewall on the market. Its open confuguration does not contain hidden rules and dependencies. You can inspect or modify every bit of configuration.

Total control
In addition to real-time statistics, Jetico Personal Firewall displays real-time rules activity information. Logging subsystem allows user to trace down any firewall event.

20-September-2007 version 2.0.0.35 released. Changes:
* System crash caused by bc_tdi_f.sys driver under heavy load fixed.
* Application adding via "..."(Browse) problem in rule editor on Vista fixed.
* Firewall shutdown now allowed with expired license.
* Configuration Wizard "Next >" button behavior fixed.
* Default configuration template updated:
o Rule for Ximeta NDAS devices added (off by default)
o "Network Time Protocol client" application template table added
o "Allow everything" application template table added

Windows 2000/XP/2003/XP x64/2003 x64/Vista/Vista x64

Download:

برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

m2stech
10-10-2007, 16:51
بهترین تنظیمات و setting توی قسمت security برای comodo firewall 2.4 چیه ؟

Carl
06-11-2007, 14:21
PC Tools Firewall Plus v3.0.0.52 Final


PC Tools Firewall Plus feature highlights
* Protects your PC as you are working, surfing and playing.
* Intelligent automatic protection without all the questions.
* Easy to use. Designed for both, novice and expert users.
* Advanced rules to protect your PC against common attacks.
* Best of all it’s FREE. No catches, limitations or time-limits.
* Platforms: Windows Vista™, XP and 2000

> Download

برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

Mahiar0
12-12-2007, 20:11
Jetico Personal Firewall درمورداين بيشتر توضيح ميديد تنظيماتش وروي چي بگذاريم بهتره
چون اينطور به نظر مياد بايد از همه بهتر باشه

hamilton
12-12-2007, 22:06
Jetico Personal Firewall درمورداين بيشتر توضيح ميديد تنظيماتش وروي چي بگذاريم بهتره
چون اينطور به نظر مياد بايد از همه بهتر باشه

دوست عزيز اين تاپيك به معرفي فايروالها اختصاص داره.اگر سوال خود را در تاپيك زير مطرح كنيد مناسبتر خواهد بود:

مقایسه فایروال ها ([ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ])

x_2007
14-02-2008, 23:49
[ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ] ([ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ])


ISS BlackICE PC Protection/ Server Protection 3.6 cqv


این برنامه یکی از معروفترین و قویترین برنامه های فایروال می باشد که می تواند کارهای مختلفی را انجام دهد از جمله آن زیر نظر گرفتن تمام ورودی ها و خروجی های سیستم در حالت اتصال به اینترنت می باشد. این برنامه را معمولا حرفه ای ها مورد استفاده قرار می دهند و نسخه سرور آن در دفاع از شبکه های کامپیوتری در برابر نفوذگران اینترنتی مورد استفاده قرار می گیرد.

اگر به دنبال يک فايروال بسيار قوي براي محافظت از ارتباط DSL, cable, يا dial-up در برابر هکرها مي گرديد ، به شما اطمينان مي دهم که اين نرم افزار کليه خواسته هاي شما را برآورده مي سازد. اين نرم افزار هر بسته اي را که به سمت شماارسال مي شود را بازرسي نموده تا مطمئن شود که از وجود متخاصم عاري است . اين نرم افزار حتي شما را از حمله احتمالي اشخاصي که شما براي آنها مجوز ورود هم صادر نموده ايد ، در امان مي دارد. اين نرم افزار در عين کارايي نياز به آموزش خاصي نداشته و کار با آن بسيار راحت است.

این نرم افزار در دو نسخه PC Protection و Server Protection برای عموم عرضه شده است .


BlackICE PC Protection: Windows? 98, XP Home, XP Pro, 2000 Pro, Me, NT 4.0 Workstation


Homepage - [ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ] ([ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ])

Release Notes ([ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ])


Size: 6.60 MB

Download BlackICE PC Protection ([ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ])

Download BlackICE Server Protection ([ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ])




PC: D171F40A4667
Server: 8765D52A5000

PC: 6B59E10D3343
Server: 677F832AAFE2

PC: B42F540AEE92
Server: D040FF2A34C1

PC: B4471B0A91A8
Server: B807612A1D3C



PC: 2774B00A795E
Server: 527CCC2CB139



KeyGen pc ([ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ])


KeyGen Server ([ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ])

Luxe
01-03-2008, 22:36
Agnitum Outpost Security Suite Pro 2008 v6.0.2225

[ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ]

Details..

Advanced firewall for secure connections
Combined antivirus and antispyware for all-in-one malware defense
Host protection to block zero-day threats
Web control to protect your PC from web-borne threats
Antispam to automatically keep your inbox junk-free
Download:

برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنیدpass: desert

Mohsen6558
15-03-2008, 00:59
به نظر شخص خودم که تا حالا زیاد تست کردم بهترینه

[ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ]
Comodo Firewall Pro 3.0.19.318, XP and Vista, 32 64x
Comodo Firewall Pro will secure your system against internal attacks such as Trojan viruses, malicious software, and external attacks by hackers. With a user-friendly single click interface you can allow or block access to the Internet offering complete immunity to attacks and total protection of your personal information. Real time traffic monitoring enables you to react instantly to threats and identify bandwidth bottlenecks. Silent Security Technology means no needless alerts with out-of-the-box protection against

[ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ]
32x :

برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید
64x:

برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

x_2007
24-03-2008, 12:08
سلام

به علت ایجاد یک زیر مجموعه مستقل برای انتی ویروس ونرم افزارهای امنیتی در انجمن معرفی نرم افزار این تایپک

قفل میشه وبه صورت ارشیودر میاد .دوستان میتونند برای هر محصول جدید در صورت نبودن تایپک مربوط به اون تایپک جدیدی ایجاد کنند ودر اونجا اقدام به معرفی نسخه های جدید کنند.ممنون[ برای مشاهده لینک ، لطفا با نام کاربری خود وارد شوید یا ثبت نام کنید ]