تبلیغات :
آکوستیک ، فوم شانه تخم مرغی، صداگیر ماینر ، یونولیت
دستگاه جوجه کشی حرفه ای
فروش آنلاین لباس کودک
خرید فالوور ایرانی
خرید فالوور اینستاگرام
خرید ممبر تلگرام

[ + افزودن آگهی متنی جدید ]




صفحه 1 از 4 1234 آخرآخر
نمايش نتايج 1 به 10 از 37

نام تاپيک: آرشیو انواع فایروال

  1. #1
    حـــــرفـه ای vtn54's Avatar
    تاريخ عضويت
    Oct 2005
    پست ها
    1,794

    پيش فرض آرشیو انواع فایروال

    با عرض سلام خدمت تمامی دوستان عزیز

    بنا به پیشنهاد دوست عزیزمان Shahvand عزیز و برای جلوگیری از به هم خوردن نظم انجمن و سردرگمی کاربران عزیز

    لطفا دوستان عزیز پس از این در این تاپیک آخرین نسخه انواع فایروال را معرفی کنند.لازم به ذکر است که این

    تاپیک فقط برای معرفی این نرم افزارها بوده و لطفا دوستان بحثهای مربوط به انها را در تاپیک اختصاصی هر نرم افزار دنبال کنند .


    با تشکر

    vtn54

  2. #2
    حـــــرفـه ای *Batman*'s Avatar
    تاريخ عضويت
    Dec 2005
    محل سكونت
    Virtual Environment
    پست ها
    5,203

    پيش فرض Comodo Firewall Pro 2.4



    کد:
    برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید
    Size=7.5 MB

  3. #3
    حـــــرفـه ای Jalal's Avatar
    تاريخ عضويت
    Jun 2006
    محل سكونت
    تهران و حومه
    پست ها
    7,972

    پيش فرض

    Ashampoo Firewall PRO v1.20
    Ashampoo FireWall PRO is like a trusty watchdog standing guard at the entrance to your property. It is always alert and checks everything going in and out of your computer, keeping out unwanted intruders and preventing unauthorized access to the Internet from your computer. And despite its impressive power it is so simple to use – in Easy Mode you just click and go for full protection.

    کد:
    برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

  4. #4
    حـــــرفـه ای Jalal's Avatar
    تاريخ عضويت
    Jun 2006
    محل سكونت
    تهران و حومه
    پست ها
    7,972

    پيش فرض

    Iss Blackice Pc Protection



    ISS BlackICE PC Protection/ Server Protection 3.6 cqd

    BlackICE teams a personal firewall with an advanced intrusion detection system to constantly watch your Internet connection for suspicious behavior. BlackICE responds immediately by alerting you to trouble and instantly blocking the threat. BlackICE automatically detects and blocks attacks through a comprehensive inspection of all inbound and outbound information to your computer. And BlackICE PC Protection is constantly working to secure your dial-up, DSL, and cable modem from hackers 24 hours a day, every day of the year.
    BlackICE's Application Protection quickly and invisibly defeats dangerous programs that attackers deliver through instant messaging, email, or even your Web browser! BlackICE stops these destructive programs before they do harm-like damaging your PC or launching email attacks against your friends and co-workers.



    *** BlackICE PC Protection Guards and Secures Against:
    - Theft of personal identity, passwords or credit card info and more?
    - Hackers using your PC to launch attacks against other PC users
    - Computer downtime and system crashes

    *** BlackICE STOPS ATTACKERS COLD:
    - BLOCKS hacker attacks instantly
    - PREVENTS destructive applications like worms and Trojans from ever starting
    - REPORTS attempted attacks and identifies intruders
    - SECURES any Internet connection, including dial-up, DSL, or cable modem

    *** BlackICE PC Protection is Powerful and Easy-to-Use:
    - BlackICE teams a personal firewall with an advanced intrusion detection system to constantly watch your Internet connection for suspicious behavior. BlackICE responds immediately by alerting you to trouble and instantly blocking the threat.
    - BlackICE PC Protection now features Application Protection, an exciting new feature designed to shield your PCs, laptops and workstations from hijack by an attacker, and protects you from Trojan horse applications, worms and other destructive threats.
    - BlackICE's Application Protection quickly and invisibly defeats dangerous programs that attackers deliver through instant messaging, email, or even your Web browser! BlackICE stops these destructive programs before they do harm-like damaging your PC or launching email attacks against your friends and co-workers.
    - BlackICE automatically detects and blocks attacks through a comprehensive inspection of all inbound and outbound information to your computer. And BlackICE PC Protection is constantly working to secure your dial-up, DSL, and cable modem from hackers 24 hours a day, every day of the year.

    BlackICE PC Protection: Windows? 98, XP Home, XP Pro, 2000 Pro, Me, NT 4.0 Workstation
    Download full :

    کد:
    برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

  5. #5
    حـــــرفـه ای Jalal's Avatar
    تاريخ عضويت
    Jun 2006
    محل سكونت
    تهران و حومه
    پست ها
    7,972

    پيش فرض

    Jetico Personal Firewall
    jetico Personal Firewall protects your computer from unwanted hacker's attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity. Jetico Personal Firewall checks every packet that comes in or out of your computer. Using configuration sets for Security Policy you define how your computer is connected to the local network and the whole Internet. Your computer may be completely hidden from any unfriendly attempts to access your hard drive while you are able to access any web sites you want and you decide on which applications are allowed to access Internet and which are not. With Jetico Personal Firewall you feel secure, safe and protected while enjoying all Internet activities.

    Changes in 23-April-2007, version 2.0.0.30:
    - Rule update after group values change fixed.
    - Rule reordering for copy/move operations fixed.
    - Application rule parameters (local port, remote address) order corrected.
    - Hash parameter handling bug fixed.
    - Event log mesaages improved.
    - IP rule parameters are displayed in the 'Misc' column.
    - Configuration Wizard import function fixed.
    - Chinese (simplified) translation contributed by Gao Xue Feng.

    کد:
    برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

  6. #6
    حـــــرفـه ای Jalal's Avatar
    تاريخ عضويت
    Jun 2006
    محل سكونت
    تهران و حومه
    پست ها
    7,972

    پيش فرض

    CA Personal Firewall2007 9.0.0.68

    CA Personal Firewall provides complete, business-strength hacker and privacy protection. It stops hacker attacks, automatically delivers up-to-the-minute advice about which programs are safe and which are dangerous, blocks annoying pop-ups, controls cookies, and protects you against identity theft.

    کد:
    برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

  7. #7
    حـــــرفـه ای Jalal's Avatar
    تاريخ عضويت
    Jun 2006
    محل سكونت
    تهران و حومه
    پست ها
    7,972

    پيش فرض

    Sunbelt Kerio Personal Firewall V4.3.635.0


    The Sunbelt Personal Firewall helps you control how your computer exchanges data with other computers on the Internet or local network. Even if you have a router that has a built-in firewall, you will still benefit from using Sunbelt Personal Firewall on your PC(s). It's the principle of "belt-and-suspenders" (being double-safe) which is a strongly recommended strategy to deal with these 'Internet Bad Guys'. The Sunbelt Personal Firewall also protects your PC from attacks initiated by other PC's on your network that might have been compromised.
    Sunbelt Personal Firewall is a necessity for all desktop computers connected to broadband Internet, using DSL, cable, ISDN, WiFi or satellite modems. Within an organization, Kerio Personal Firewall prevents a single computer from attacks initiated by internal users. Remote workstations and laptops running KPF are protected from Internet born attacks. And if you have a notebook PC, you definitely should use the Sunbelt Personal Firewall on that notebook as well. Notebooks are especially easy to compromise because of built-in wireless access.

    Potential intruders use various techniques to find out if your PC is vulnerable to attacks. These techniques vary from simply scanning all the entry points (called 'ports') of your computer to far more sophisticated methods. But the Sunbelt Personal Firewall has a built-in intrusion prevention system that identifies and blocks both known and unknown attacks so you can breathe easy and enjoy surfing the web. It really is an essential element of your Internet Safety.

    F E A T U R E S of "Sunbelt Personal Firewall":
    · Stop all traffic – stops all traffic on the computer. This function can be helpful especially when undesirable or strange network activity is detected. Traffic can be restored after the appropriate security actions are taken.
    · Logging – Each firewall module creates an independent log that is stored in a text file. Logs can be viewed in a configuration dialog. Logs can also be stored on a Syslog server.
    · Connections overview and statistics – The overview provides information about established connections and ports opened by individual applications. Information on the current speed and size of transmitted data in both directions is also provided for active connections. The overview is automatically refreshed in predefined time intervals. Statistics show users the number of objects blocked by the Web content filter and the number of detected intrusions during specific time periods.
    · Automatic update – Regular checks are made for newer versions of the firewall. Whenever a new version is detected, users have the option of downloading and installing it. It is also possible to check for new versions manually

    Changes in Version 4.3.635:
    * Corrected issue in which registration fails when firewall is enabled.
    * Significant improvement in network performance when web filtering is enabled.
    * Enhanced Process Injection prevention to prevent code inject attempts into Windows system DLLs.
    * Corrected numerous application crashes in the firewall service.
    * Corrected various crashes in assist.exe
    * Corrected issue in which setting password and checking for update does not cancel authentication form.
    * Corrected issue in which binary data appeared in logs.
    * Significant improvement in product stability.
    [ برای مشاهده لینک ، با نام کاربری خود وارد شوید یا ثبت نام کنید ]


    کد:
    برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

  8. #8
    پروفشنال Persian.Boy's Avatar
    تاريخ عضويت
    Jan 2007
    پست ها
    727

    پيش فرض

    Shahvand جان فایروال Iss Blackice Pc Protection توسط شرکت Sunbelt خریداری شده و جای خودش رو به فایروال

    Kerio Personal Firewall داده. یعنی از این به بعد فایروالی به اسم Iss Blackice Pc Protection وجود نخواهد داشت.

    شما اگر به سایت Iss Blackice نیز مراجعه کنید متوجه خواهید شد که شرکت Sunbelt اوگوی خودش رو در پایین صفحه

    قرار داده.

    فکر کنم قراره تغییراتی در Kerio Personal Firewall انجام بشه. امیدوارم که این تغییرات بتونه کریو رو در مقابل

    Leaktest ها قوی تر کنه. چون الان 2 تیم امنیتی کریو و Iss Blackice Pc Protection دارند بر روی این فایروال کار

    میکنند.


    اطلاعات بیشتر در سایت زیر...

    کد:
    برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید
    Last edited by Persian.Boy; 04-08-2007 at 16:42.

  9. #9
    حـــــرفـه ای Jalal's Avatar
    تاريخ عضويت
    Jun 2006
    محل سكونت
    تهران و حومه
    پست ها
    7,972

    پيش فرض

    Agnitum Outpost Firewall pro 4.0 build 1025/700/303



    FirewallsOutpost Firewall Pro provides a superior arsenal of defense against PC infiltration. Outpost ensures your online security with solid protection against all internet-borne threats. Outpost is the first personal firewall developed with Open Architecture. It is also the first personal firewall that supports plug-ins. Sample plug-ins are included to show how this revolutionary technology can easily be employed for such tasks as Intrusion Detection, Advertisement Blocking, Content Filtering, E-mail Guard, and Privacy Control. It is equipped with every feature a personal firewall should have. It is the most functional firewall in the world. It supports all the latest security techniques and features such as: Full Stealth Mode, Anti-Leak, and MD5 Authentication.

    Being online is fraught with dangers: Internet worms, spyware agents, Trojan horses, hijackers and more can wreak havoc, causing anything from slow performance to system crashes to full-blown identity theft. And to provide you with the kind of protection you need in these days of cyberthieves and online extortionists, your firewall must be able to monitor all inbound and outbound traffic and protect you from any unauthorized intrusion by rendering your PC invisible to anything that you haven’t authorized to see it.

    Outpost Personal Firewall PRO Features:

    *** Security.
    - Detects all types of hacker attacks. The powerful Intrusion Detection System (IDS) built into Outpost protects your PC from both known and unknown types of hacker attacks. It screens inbound data and determines its legitimacy, either by comparing it against a set of known attack fingerprints or by performing behavior evaluation analysis.
    - Protects all types of network connectivity. Outpost's Ethernet protection module protects network packets in transit — like chat sessions — from being hijacked. Such attacks can also disable or disrupt network connections and steal WiFi connectivity, so Outpost blocks any interference with network connectivity.
    - Defeats all types of spyware infections. Outpost's Anti-Spyware module safeguards PCs against spyware infection and the loss of confidential information. Spyware is blocked at every possible stage — installation, activation, transmission of information and re-installation. Outpost's active spyware monitor makes sure no spyware can activate on your PC, by monitoring critical areas of the system and keeping them clean. The on-demand scanner scours the system for traces of deactivated spyware and erases them completely. Even if you disable active spyware protection during processor-intensive tasks like online games, new network connections are proactively verified in the background to be spyware-free before being allowed to proceed.
    - Prevents all types of data theft. Outpost's comprehensive Anti-Leak function constantly monitors how your applications interact with one another, preventing malware programs from controlling trusted applications and accessing the network on their behalf. Anti-Leak protection guards against dozens of malware techniques designed to sneak personal data past the firewall's outbound sensors. And even if malware finds its way onto the system, it won't be able to transfer any data out of the network because the ID block function lets you define and lock down blocks of text, preventing them from being removed from the machine by any electronic means — IM, web access or email correspondence.
    - Attachment quarantine. Attachment Quarantine protects you from the threat posed by accidentally opening email attachments that may contain viruses, worms or other malware and lets you customize which types of attachments Outpost should block.

    *** Control.
    - Network Activity Monitoring. Monitoring shows every connection between your machine and other computers on the Internet or LAN. It’s a handy tool to know what’s happening on a connected PC at any given time and to allow users to quickly stop unwanted Internet communications.
    - Events Logging. The Log Viewer provides a detailed and complete history of computer activity, enabling you to review what's happened on a computer in the past or pinpoint a problem early on and correct it. Customized logging ensures you get only the information you want from Outpost, disregarding repetitive or irrelevant events. You can even configure exclusions for certain types of communications, such as NetBIOS or P2P traffic.
    - Self-protection. Today's malware frequently seeks to shut down security software to simplify its infection process. Outpost 4.0 incorporates protection for all its components, making it impossible for anyone except the authorized user to disable or close Outpost protection.
    - Packet/Application filtering. By implementing process-based data filtering, Outpost serves as a virtual checkpoint for incoming and outgoing application data. Based on certain common attributes or according to specific user instructions, it automatically configures how each particular application communicates over the LAN or the Internet. Through the use of these application access rules, any unauthorized program can easily be denied Internet access if the circumstances warrant it. Packet filtering is a lower-level filtering technique that lets you select which protocols, ports and remote addresses are allowed to be accessed from your PC.
    - Adaptive firewall rules. Outpost Firewall Pro 4.0 includes macro definitions for applications, which enable you to manually define security rules for individual applications and Windows-based services. For example, you can now choose to limit DNS requests to the list of DNS services built into the network adaptor. If DNS is trying to reach an unlisted DNS server, you will be prompted to allow or block this action.
    - support for 64-bit Windows. Outpost Firewall Pro now supports Windows XP 64-bit Edition and is fully compatible with the hardware and software environments of 64-bit computing.

    *** Privacy.
    - Identity shield. By customizing blocks of cookie files and external referral URLs, you can maintain a high level of privacy when you visit unfamiliar sites while still allowing trusted sites controlled access to personal information.
    - Faster, cleaner surfing. Outpost Firewall Pro lets you limit the elements displayed on web pages, providing content control and faster page displays. You can define the sites that are permitted (or not permitted) to display images, rotate advertising or deliver pop-ups. In this way, any type of unwanted graphical or multimedia content can be restricted.
    - Port stealthing. Being visible on the Internet is good only when whoever 'sees' your computer is authorized to do so. Outpost makes sure that your computer is hidden from unauthorized outsiders, protecting it against network probes and attempts to establish unauthorized communication channels..
    - Content management. The built-in Content Management module lets you compile a list of words and phrases blocked from being displayed on web sites — a particularly valuable feature for parents who do not want their children exposed to inappropriate content.

    *** Ease of Use.
    - Effortless installation. Automatic installation takes care of the entire installation process, as well as the initial configuration, and is most suitable for less experienced users. The Installation Wizard, more suitable for users experienced with firewall installation and configuration, allows customization and the selection of specific operational parameters.
    - ImproveNet service minimizes ruleset errors. ImproveNet is a network community that brings Outpost users and Agnitum engineers together to share configurations and enable everyone to benefit from Internet access security rules that are universally applicable. By participating in the ImproveNet service, users can adjust their application access rules to protect their most current applications against the latest threats. Because new rules are created and processed on a daily basis, you have access to a continuously updated set of access rules for the most popular Internet-enabled programs. You no longer need to manually create rule sets, the most common way to introduce vulnerabilities to the firewall protection.
    - Entertainment mode for uninterrupted gameplay and video viewing. While you play games or watch videos on your PC, Outpost's Entertainment Mode ensures that the firewall won't interrupt you with connection questions, without sacrificing the level of protection. You can customize which applications will automatically activate Entertainment Mode.
    - SmartAdvisor instant, context-sensitive help. When ImproveNet doesn't have the answer, SmartAdvisor is always on hand to help you make the right decision when configuring access information for an application.
    - Automatic access rules. Outpost automatically configures the computer's network settings and protects it against unauthorized incoming Internet connections. Predefined rules for known applications are created automatically, so you don't need to manually create program access rules for frequently used applications.
    - Easy program updates. When an update to Outpost is released, the program's update module automatically retrieves the latest version from the Agnitum server and applies it as soon as you authorize it to do so.

    Changes in Outpost Firewall Pro 4.0 (build 1025/700/303), July 18, 2007:
    The following issues are fixed (only significant ones are listed):
    o More strict rules for DNS activity
    o Automatic rules creation issue (active rules were disabled)
    o Freezes on x64 platform

    Download for x86:

    کد:
    برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

  10. #10
    حـــــرفـه ای Jalal's Avatar
    تاريخ عضويت
    Jun 2006
    محل سكونت
    تهران و حومه
    پست ها
    7,972

    پيش فرض

    Kerio.WinRoute.Firewall.v6.3.1.2906


    Corporate & enterprise network firewall

    Kerio WinRoute Firewall™ is a corporate gateway firewall for small and medium-sized businesses. Equipped with VPN, anti-virus protection, web filtering, reporting, and more, Kerio WinRoute Firewall provides a comprehensive network management and security solution.

    Kerio WinRoute Firewall sets new standards in versatility, security and user access control. Designed for corporate networks, it defends against external attacks and viruses and can restrict access to websites based on their content.

    Deep inspection firewall
    Kerio WinRoute Firewall, certified by ICSA Labs in the Corporate Firewall category, includes detailed rule definition to perform stateful inspection and protocol inspection of all outgoing and incoming Internet traffic. A network rules wizard assists in the rapid setup of the firewall. Read more...

    VPN, VPN Client & SSL VPN
    Kerio's built-in SSL-based VPN server works in both client-to-server and server-to-server modes, allowing both branch offices and remote workers to securely connect to the corporate LAN. Clientless SSL VPN allows remote users to connect securely to the corporate network for file sharing from any computer with a browser and Internet connection. Read more...

    Antivirus gateway protection
    Kerio WinRoute Firewall provides optional virus scanning of inbound and outbound email, web traffic, and FTP transfers. In addition to a version with integrated McAfee Anti-Virus, there are several other anti-virus options to choose from. Read more...

    Surf protection
    The integrated (IBM) ISS Orange Web Filter option blocks users from accessing to up to 58 categories of web content, reducing legal liabilities for corporate and educational environments. Read more...

    Content filtering
    Kerio WinRoute Firewall offers a variety of content security features such as MP3 music download blocking, filtering for potentially dangerous executable files or blocking of annoying pop-up windows. The P2P Eliminator automatically detects and blocks peer-to-peer networks such as Kazaa. Read more...

    User-specific access management
    Each user in the network can be required to log in to Kerio WinRoute Firewall before connecting to the Internet. That allows for restrictive security and access policies to be applied based on the specific user, rather than the IP address. Transparent Active Directory support simplifies user account mapping to Windows domains, and an auto-add feature allows for creation of user-specific policies before users authenticate. Read more...

    Fast Internet sharing
    Support for DSL, cable modems, ISDN, satellite, dial-up or wireless Internet allows administrators to deploy Kerio WinRoute Firewall in networks of all sizes and in all locations. Users can share one Internet connection with fail-over to a backup connection. Administrators can use the Bandwidth Limiter to optimize the data throughput for business critical applications. Read more...

    VoIP and UPnP support
    Kerio WinRoute Firewall allows H.323 and SIP protocols to connect through it, eliminating the need to publicly expose the VoIP infrastructure to the Internet. Also, it integrates UPnP technology so that compliant applications such as MSN Messenger run instantly without requiring additional configuration at the firewall. Read more...

    Reporting and administration
    Well-arranged charts and statistics help spot problems and report usage habits. The administration console can be installed remotely to allow secure configuration from anywhere on the network. Every important event is reported to the administrator by email. Well-arranged charts and statistics help spot the problems and usage habits. Read more...

    کد:
    برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید

صفحه 1 از 4 1234 آخرآخر

Thread Information

Users Browsing this Thread

هم اکنون 1 کاربر در حال مشاهده این تاپیک میباشد. (0 کاربر عضو شده و 1 مهمان)

User Tag List

قوانين ايجاد تاپيک در انجمن

  • شما نمی توانید تاپیک ایحاد کنید
  • شما نمی توانید پاسخی ارسال کنید
  • شما نمی توانید فایل پیوست کنید
  • شما نمی توانید پاسخ خود را ویرایش کنید
  •