Sunday, January 9, 2011

Firewalls


Folder Lock 6.5.2 Full FN | 8.21 MB


Folder Lock is a file encryption software that offers fastest way of encrypting and password protecting files and folders. You can either choose to encrypt important files from techies or lock your files, pictures and private data from casual users. Folder Lock comes with locking, encryption, shredding, stealth mode, hack attempt monitoring, portability, plug & play support, history cleaning, and more than 20 privacy features all tailored to special needs for people wanting privacy and security.



Folder Lock creates encrypted storages called 'Lockers'. You can keep as many of your private files & folders in your Locker and password protect it with a single click. You can transfer, secure and backup these Lockers. Lockers are portable, you can keep them in USB Drives, CD/DVD, & notebooks or transfer them via email or upload. These Lockers are undeletable on the computer where Folder Lock is installed.
Folder Lock uses US military standard 256-bit Advanced Encryption Standard Algorithm to protect your valuables. Encryption is on-the-fly and decryption is automatic i.e. content is loaded in memory instead of hard drive. This means your data is unrecoverable without correct password no matter how the protection is tampered and the protection is fast as it does away the hassle of decrypting everything in your hard drive.

Folder Lock offers full portability by offering PC independent password protection of your files and folders. Create a portable Locker in your USB Drive or Memory Stick and Folder Lock will also create an autoplay executable in your USB drive. Automatic plug & plug is also supported making it easy to open protected Lockers on USB drive without the need to install Folder Lock.

With Folder Lock, all your data sits in one location i.e. your secured Locker. Furthermore, the program support multi-user interface making it easy for the whole family or your colleagues to use your computer for storing their own Lockers with their own passwords. Never again worry about data loss, theft or privacy breaches. If you share your computer with others or fear hackers and thieves may steal your data, give Folder Lock a try!

Folder Lock is compatible on all 32-bit and 64-bit flavors of Windows 7.0, Windows Vista, Windows XP, Windows 2008, Windows 2003 Server and Windows 2000. The protection is cross-platform compatible and PC independent. Folder Lock offers great features and zero compromise on data security in all versions of Windows.

Features and Benefits:
* 256-bit AES encryption on-the-fly (military standard) for file protection.
* File Lock, Folder Lock, Drive Lock, File Encryption and Folder Encryption. All in one complete package.
* Full Portability. Password protect USB Drives, Lock CDs & DVDs and share password with trusted friends.
* Backup or transfer your password protected Lockers anywhere. All data sits in one place for easy backup.
* Undeletable Lockers (on the PC where Folder Lock is installed). Deletion requires you to login into Folder Lock.
* Shred files automatically when data is encrypted. Choose this option for full data security.
* Stealth Mode feature can efficiently hide all the traces of Folder Lock ever been installed on your PC.
* Windows History Cleaning. Removes recent history of PC activity automatically when Locker closes.
* Hack Attempt Monitoring option can monitor fake password attempts and can Shutdown PC automatically.
* Fastest Encryption! Encrypted data is later decrypted in memory, preventing data recovery & slow processing.
* Complete Privacy! Whether you're concerned with privacy, data theft, data loss, data leaks or virus attacks. You need Folder Lock!

Changes in Folder Lock 6.5.2 (December 6th, 2010):

- Maintenance update, a few bug fixes, better support & compatibility for all variants of Windows 7




Copy Protect v1.0.0 SCRT | 23.3 MB


Copy Protect is a copy protection software program that lets you prevent illegal copying of your media files.

Copy Protect is a copy protection software program that lets you prevent illegal copying of your media files. The program supports most audio, video, document and picture file formats. Copy Protect works by converting your media files into executable applications that run only in the drive they are made for. A copy protected file is useless and won’t run if copied and executed from another drive or computer, thus preventing illegal distribution. Copy Protect applies hard-core patent pending technology which ensures complete copy protection of your files.

Piracy of media files especially movies and audios is a big problem costing movies and music industries billions of dollars every year, but now the solution to this big problem is at hand. With Copy Protect, you can prevent illegal copying and distribution of your media files by converting them into copy protected applications. It also lets you securely burn copy protected applications to your disks so that you can distribute them without the fear of piracy.

Up to this day, there is no real way you can prevent copying of your most precious creative works, arts, documents or presentations. Anything you create and distribute over the internet is for anyone for grabs. In such an environment, a solution that converts your creative works into logically controlled executables that know where to run and where to stop is a way to go. Copy Protect offers you tamper proof copy protection technology for your media files and documents and ensures complete security against piracy and illegal copying.

Some of the features of Copy Protect are listed below:

* Unbreakable copy protection for your videos, audios, pictures and documents.
*
* Burn copy protected data to your own CD or DVD for distribution without the fear of data being copied illegally.
*
* Easy to use and navigate graphical user interface that does not require any additional programming skills.
*
* Simple and effective data copy protection procedures.
*
* Protect your media files and art work from illegal copy from one computer to another.
*
* Securely distribute your films, songs, files, documents, reports and other copyright material on any distribution media like CD, DVD, Blu-ray disc, USB drive, external drive etc.
*
* Highly customized copy protection application to tailor your needs.
*
* Play copy protected videos and audios directly from the destination drive where you have saved them.
*
* No need to install the application at other end to run the copy protected files and documents.
*
* Prevent image theft, piracy, illegal distribution and leakage of your data from your CD/DVD or USB drive to any other drive.
*
* Work well with Windows XP 32-bit, XP 64-bit, Vista 32-bit, Vista 64-bit, Windows 7.


Copy Protect works perfectly well on all platforms of Windows
including their 32-bit and 64-bit variants i.e. Windows XP, Windows Vista, Windows 7.0, Windows 2003 Server, Windows 2000 and Windows 2008. The program works flawlessly on all file systems like FAT, FAT32 and NTFS. Copy Protect is a portable application which does not require administrative rights and does not require installation at other end.


Online Armor Personal Firewall 4.5.0.234
Online Armor Personal Firewall 4.5.0.234 | 11.6 MB

Online Armor - Firewall, which protects the computer when the user is online and goes to various sites. So if you go to a dangerous site, then it will not be able to quietly install malicious software - Online Armor Free does not allow this.

In standard mode, most of the action will be carried out automatically on the basis of the "white list" in the possession of the firewall. In addition to the firewall features in the program, there are other opportunities for the full protection of your computer.

Online Armor provides several ways to protect, including does not run programs that the user did not give permission to run.

Online Armor FREE is a powerful windows firewall - the only FREE firewall to offer 100% leak protection out of the box! It's easy to use, powerful - and completely free. Online Armor is straightforward, and simple to use. Online Armor Free is a personal firewall that enables you to keep away Internet threats while surfing on the web. It is a useful utility for those who want to block access to websites that contain possible threats.

Online Armor includes powerful "HIPS" functions, which give you the ability to stop all unrecognised programs from running on your computer unless you say so, making it possible to protect yourself against these new attacks. Of course, programs Online Armor knows are safe will be allowed to run, no problem.

This is different to a pure Antivirus program - these let any program run, unless they know it is a virus. This means that it must have that that exact threat in its database before it can do anything about it. Your antivirus will completely ignore programs it does not recognise - which unfortunately includes new viruses.

What's New in Online Armor Personal Firewall:
- Delay external IP lookup
- Add checkbox for OADump.exe at "Debug" page.
- Error message when opening locally saved HTML files with Firefox set to unknown
- IE8 won't close when set to unknown
- Fix AV engine crashes if no sigs available

Interface: English
System: Windows 2000/XP/2003/Vista/7



Jetico Personal Firewall v2.1.0.9.2447
Jetico Personal Firewall v2.1.0.9.2447 | 4.25 Mb
Jetico Personal FirewallTM software protects computers against hackers and malicious software when networked or connected to the Internet. It offers detailed, configurable event logs, reports, plus the option to view and edit the firewall configuration. The modular architecture is as open as possible to assist with easier evaluation of the security.

Jetico Personal Firewall Features:

* Monitor running applications that access the network
* Monitor selected/all network packets as well as selected network events
* Choose a pre-defined Security Policy — the firewall rule set
* Modify Security Policy to meet your needs
* Make your own Security Policy

Three Layers of Protection

1. Low-level. (Network packet filter). This checks the validity of network packets and parameters such as source and destination addresses, protocol, etc. Using this process, Jetico Personal Firewall can make your computer invisible to untrusted networks. By selecting the Optimal Protection Policy, your computer becomes "stealthy". Any security probing tests (for example, ShieldsUp! tests) by internet hackers will report that your computer does not exist.
2. Application-level. (Network events filter). This checks and enables you to monitor network/internet connection requests made by applications. If you aren't sure why an application wishes to send or receive data from the Internet you can limit or block the activity.
3. User-level. (Process activity filter). This notifies you of and prevents dirty tricks by Trojans and other malicious programs. A Trojan can inject its own code into programs on your computer and send data about you to a third party. For example, a Trojan in Internet Explorer could transmit details of your browsing preferences.

New Features in Jetico Personal Firewall v.2
System-related

Jetico Personal Firewall v2 runs as privileged Windows service. It can protect computer before user logon.
Native support for Windows XP Fast User Switching and Terminal Services.
Jetico Personal Firewall supports Access Control Lists for all main functions. Administrator can configure ACL to grant access to particular firewall functions for any user or group.
Windows XP Service Pack 2 Security Center support.
User interface

Improved rule editing interface.
New popup message. The new look for popup dialog is presented. Popup message text and rule creation options can be modified.
Firewall variables formerly controlled by Configuration Wizard, are integrated into main application window.
Language file support for easy localization. All translatable words and phrases are taken from single UTF-8 encoded text file.
Configuration

New XML-based open configuration file format. Detailed documentation is available upon request.
The new version maintains single protected firewall configuration for all users.
Simplified controls for configuration.
New hash handling scheme. Separate table for hash checking.
Each firewall filtering layer has own root table.
New automatic variables (per-connection) for local connections are supported.
Firewall rules

Rules support lists of parameters where possible.
IP rules support IP address ranges.
Low level protocol rules support filtering by MAC address.
Application rules have events for direct and indirect access to network. Indirect access details are also available.
New module for hash checking created.
Application, Process attack and Hash checking rules support wildcards in file paths.
Logging subsystem

Log entries can be associated with rule.
Firewall can create rule based on log information.
New WELF-compatible text log format. WELF is supported by many log analyzers.
Improved log control.

No comments:

Post a Comment