


It has built-in Intrusion Prevention System and SPI technologies for extended user protection. It gives user complete overview of all inbound and outbound network communication. a Trojan in Internet Explorer could transmit details of your browsing preferences. Is an easy to use personal firewall that allows you to protect a PC against hacker attacks, trojans, spyware and internet threats. (A Trojan can inject its own code into programmes on your computer and send data about you to a third party. This notifies you of and prevents dirty tricks by Trojans and other malicious programs. If you are not sure why an application wishes to send or receive data from the Internet you can limit or block the activity. This checks and enables you to monitor network/internet connection requests made by applications. Application-level (Network events filter) Any security probing tests (for example, ShieldsUp! tests) by internet hackers will report that your computer does not exist. By selecting the Optimal Protection Policy, your computer becomes "stealthy". Using this process, Jetico Personal Firewall can make your computer invisible to a non-trusted network.

This checks the validity of network packets and parameters such as source & destination addresses, protocol, etc. Three-layer protection: Low-level (Network packet filter) Having inherited the Open architecture principles from BestCrypt, the Jetico Personal Firewall allows you to construct a strong yet accurate security policy and provides clear control over your network connections. Jetico Personal Firewall software provides you with security against hackers who try to access your PC when you are connected to the Internet.
