برنامج Mil Firewall تظهر الاستطلاعات أن كمبيوتر جديدة يمكن أن تكون مصابة في أقل من نصف ساعة مع حصان طروادة والبرمجيات التجسسية. آخر يتزايد الاتجاه المقلق هو عدد غير البرامج الخبيثة التي ترسل المعلومات الخاصة بك و عادات الانترنت لأصحابها دون أي موافقة منك.
There are many programs that relentlessly try to breach into your computer from the Internet. The surveys show that a new computer can be infected in less than half hour with spyware and trojan horses. Another increasingly alarming trend is the number of non-malicious programs that send information about you and your online habits to their authors without any consent from you.
Mil Firewall blocks all attempts to exploit a security problem in the programs that are running on your PC. Mil Firewall will also protect your computer from infection with many viruses, trojan horses and spyware programs. It will also block any attempts of legitimate or spyware program to send your private information over the internet or to download ads and other content to show in pop-up windows.
You can use specific network access rules for each program or use global rules for all programs. There are predefined rules for most frequently used programs but you can change them.
All network access can be temporarily disabled with one click of the mouse, which gives you plenty of time to change the network access permissions without worrying that you computer may be infected while you are doing this.
Additionally, you can allow access only for some of the network adapters or for specific addresses, protocols and ports. The firewall rules are very flexible and allow very fine degree of control.
Mil Firewall blocks all attempts to exploit a security problem in the programs that are running on your PC. Mil Firewall will also protect your computer from infection with many viruses, trojan horses and spyware programs. It will also block any attempts of legitimate or spyware program to send your private information over the internet or to download ads and other content to show in pop-up windows.
You can use specific network access rules for each program or use global rules for all programs. There are predefined rules for most frequently used programs but you can change them.
All network access can be temporarily disabled with one click of the mouse, which gives you plenty of time to change the network access permissions without worrying that you computer may be infected while you are doing this.
Additionally, you can allow access only for some of the network adapters or for specific addresses, protocols and ports. The firewall rules are very flexible and allow very fine degree of control.
0 comments:
Post a Comment