Choose a pre-defined Security Policy.
Edit existing Security Policy.
Create own Security Policy (i.e.
the firewall rule set configuration).
- Monitor running applications that access data pipe.
The level helps a lot to make your machine invisible in non-trusted internet.
For example, if you set the Optimal Protection Policy in Jetico Personal Firewall, the ShieldsUp!
Internet security probing tests will report that your system is “Stealth”, i.e.
from the standpoint of hacker, the computer does not exist on the Internet.II.
program-level web connection events filtering.
Filtering of user-level process activity.
This kind of protection notifies user and cuts off dirty tricks performed by trojans and other malicious programs.
- “File”->“Save as” function implemented.