Perhaps the most often used combination in this respect is that of a separate antivirus with an independent firewall, in case the security solution doesn’t have one of its own already built-in. For those who are still on the lookout for such a security system, FortKnox Personal Firewall could be one of the possible candidates.
As soon as is it installed onto the PC, FortKnox Personal Firewall will demand a reboot in order to run properly and after the restart is acknowledged, you will be able to use it at its fullest. The rather nice looking and friendly interface of this program will allow all users to benefit from all the features of this utility and configure it with minimal efforts.
All the functions are neatly organized and there are dedicated tabs for each feature of FortKnox Personal Firewall. Thus, you can watch a live graph that keeps you posted about the incoming and outgoing traffic, as well as of the attack history.
For each active connection you have the possibility to view detailed information which includes IP, domain, MAC address and the active process that triggered it. Also, there are some advanced options that enable you to perform a traceroute or whois lookup and actually look on an online map at the exact location for that connection.
Suspicious processes can be terminated on the spot, with one click, just like any connection you do not trust. For the more experienced users, there is an ‘Advanced’ area where firewall rules can be created and edited manually.
With FortKnox Personal Firewall you can even enforce temporary or permanent restrictions for certain types of connections coming from processes started by selected users. Overall, the software proves to be in very good working condition, it provides sufficient configurations and a strong security layer to fit the needs of most users.
It gives user complete overview of all inbound and outbound network communication. Besides, FortKnox Personal Firewall comes with integrated Intrusion Prevention System and SPI technologies that will ensure enhanced user protection.
With application rules user can control how individual applications communicate over Internet. Users have option to setup extended rules that match their individual needs. With its intuitive interface it is suitable for both beginners and experienced users.
- Protects system from inbound in outbound attacks
- Traffic and packet logging
- Statefull package inspection
- Integrated Intrusion Prevention System
- All system connections overview
- Advanced rules for experienced users
- Anti-spoofing technologies
- File and printer sharing settings
- User-friendly graphics interface
- Automatic database updates
- Site Control System with ability to block individual web sites
- Ad blocking
- Referer blocking
- ActiveX blocking
- Cookies blocking
- Simple configuration
- Skin support
- Language support