iolo Firewall

Category
Network and Internet
Misc Winsock Tools
  • Developer: iolo technologies, LLC
  • Home page: www.iolo.com
  • License type: Commercial
  • Size: 448.92 KB
  • Download

Review

iolo Personal Firewall puts up a barrier against Internet threats by only allowing desired communication to and from your computer. It prevents unauthorized users from gaining access to your PC and stealing information or causing damage. Use iolo Personal Firewall to prevent identify thieves from stealing private information, protect against malicious software that can destroy a computer, and eliminate the downtime, wasted resources, and lost data caused by intrusions and attacks. Unlike some firewalls, iolo Personal Firewall controls both incoming AND outgoing traffic. It automatically detects and blocks common attacks, with no configuration needed. The innovative "IntelliDefense" feature is a proprietary threat-evaluation technology that makes iolo Personal Firewall "smarter": the firewall makes informed decisions and you see fewer messages. You can create tailored policies so that individual applications have their own set of instructions on how they can communicate over the Internet and other networks. The firewall can also detect unauthorized modifications to programs; this provides protection from malicious software that attempts to mimic legitimate programs. Various statistics allow you to view and analyze intrusion attempts and detect security vulnerabilities. Viewing this history is useful to analyze possible security breaches and reveal suspicious patterns. The firewall also provides one-click restoration of default settings, for troubleshooting and worry-free configurations, and a one-click feature to block all network traffic for instant restrictions. With a guided setup wizard, preset security levels, one-click features, and automated decision-making, complicated setup is eliminated with iolo Personal Firewall. And advanced users have greater control: port settings are fully customizable; ICMP, IGMP, and broadcast/multicast protocols can be controlled; passive FTP and Remote Desktop connections can be blocked or allowed, and much more.

Related programs

Recently downloaded programs


Search

Recent searches