Posts Tagged ‘firewall’


Personal Security SoftwareSecurity software should work well with your operating system, and it shouldn’t get in the way of your daily activities.

Most browser hijackers aim to send you messages about shopping opportunities, which results in a slower computing experience. The same is true for poorly made security solutions. (more…)


Chinese Great FirewallAn introduction to the Great Firewall (GFW)

It is interesting to know that the Chines government has blocked many of the popular websites like, Facebook, Google, and the YouTube through the filtering system called Great Firewall (GFW).

There is still one way to bypass the security system, the VPN services. (more…)

McAfee logoAs always, we wanted to make sure to keep you in the loop on all current McAfee happenings, especially as it relates to their commitment to enterprise security and NGFW.

As technology has changed the way businesses operate, IT departments have been forced to adapt to what is often a faster-paced and more decentralized approach. Employees expect instant access to corporate resources, no matter where they are in the world or what device they are using. Datacenters continue to become more virtualized, but the majority of datacenters remain a mix of physical and virtual resources. (more…)

FirewallWith the rapid growth in Internet usage, equating to approximately 2.5 billion users, network threats are on the rise. Traditional firewalls and unified threat management (UTM) products can no longer withstand various malicious threats on applications and files.

So how does the technology industry intend on protecting our computers in the future?

How firewalls work

The basic definition of what a firewall does is that it forms a barrier to keep destructive forces away from your computer.

Its job is similar to a physical firewall that keeps a fire from spreading from one area to the next. It acts like a filter between your computer and the internet. You can program what you want to access and what you don’t want to get in, everything else is not allowed.

Firewalls can prevent access to certain websites and outside computers from accessing those inside a network. (more…)

Sphirewall firewall

The Sphirewall team is pleased to announce yesterday the release Sphirewall 0.9.9.7, the open source specialized system for the organization of the routers and firewalls, providing flexible tools for analyzing traffic patterns and monitoring of users’ work.

The project is developing a set of modules and associated web-based interface for easy configuration and monitoring, which is very flexible and versatile, making it possible to adapt it for a variety of packet filters and system components. Available for download as iso-image with a ready to deploy the system and the set of packages to be installed in the Debian GNU / Linux. The achievements of the project released under the GPLv3. (more…)

UserGate FirewallUserGate Proxy Firewall – UTM solution to provide comprehensive network security, control general access to the Internet and run Web applications, create and maintain VPN-connections, filter unwanted and dangerous resources, control the width of the channel and to create virtual networks. The first version of the sixth generation of the product was released in November 2012.

UserGate Proxy & Firewall protects LAN thanks to two built-in anti-virus modules of the leading developers of anti-virus solutions – “Kaspersky Lab” and Panda Security. Anti-virus modules that make sure all network traffic, including e-mail, HTTP-and FTP-traffic. In addition to anti-virus protection built into UserGate firewall that protects the network from external attacks. The product also includes a DHCP-server for dynamic IP-addresses on the local network resource publishing feature, which allows you to gain access to corporate resources from outside the local network. (more…)

comodo logoThe company Comodo, a leading manufacturer of protective equipment, announces the availability of a new version of Comodo Internet Security Pro 2013. The proposed set of powerful antivirus and firewall, used in combination with a functional ‘sandbox’ and intrusion prevention, is able to effectively protect your computer from a variety of threats.

The proposed product ensures reliable protection in real time from viruses, Trojans, spyware and other types of malicious applications, both existing and entirely new. Users who installed CIS 2013 on your computer, will be timely notified of suspicious activity programs installed, for example, that efforts were out to online. If the application is marked by Antivirus as suspicious, does not cause you concern, you can manually add it to the ‘white’ list.

Hosts PC offers four modes of scanning. In the ‘Quick Scan’ product Comodo Internet Security 2013 examines key areas of your system for viruses and other threats. Option ‘Full Scan’ is used to perform a complete check, which takes more time, but provides a more impressive results. If you intend to custom scan individual files and folders, use the option «Custom Scan». A regime «Rating Scan» will tap cloud reputation services to check critical files. (more…)