C
cashman
http://www.jetico.com/index.htm#/jpfirewall.htm
http://www.jetico.com/jpfwall.exe
The Jetico Personal Firewall software allows the user:
a.. Protect computer from both inbound hackers' attacks from network as well as from
unwished network access attempts performed by malicious software.
b.. Choose a pre-defined Security Policy.
c.. Edit existing Security Policy.
d.. Create own Security Policy (i.e. the firewall rule set configuration).
e.. Monitor running applications that access network.
f.. Monitor selected/all the network packets as well as selected network events.
http://www.jetico.com/jpfwall.exe
The Jetico Personal Firewall software allows the user:
a.. Protect computer from both inbound hackers' attacks from network as well as from
unwished network access attempts performed by malicious software.
b.. Choose a pre-defined Security Policy.
c.. Edit existing Security Policy.
d.. Create own Security Policy (i.e. the firewall rule set configuration).
e.. Monitor running applications that access network.
f.. Monitor selected/all the network packets as well as selected network events.