contents | software | |||||||
| Agnitum Issues Outpost Firewall Pro 4.0 This new version of the software provides home, small-office and mobile corporate users with powerful protection against spyware, keyloggers, Trojans, hackers, identity theft, rootkits, wireless network hijacking, and other Internet-borne attacks. Outpost Firewall Pro 4.0 is available immediately worldwide and runs under Windows XP, x64, 2000, 98 and ME. It is available in English, Spanish, French, German, and Russian. Outpost Firewall Pro 4.0 delivers a high level of protection with a range of new and improved tools, including support for 64-bit operating systems. Strengthened anti-leak functionality, preventing all known methods for stealing information from a user's PC by Trojans, spyware and adware that exploit operating system holes. With version 4, users may customize permissions and restrictions on outbound data transfers by any application attempting to gain control of another, attempting to launch a browser, or attempting to use the memory space of a trusted application. Spyware protection now blocks all known malicious applications. Additional protection against unknown malicious applications has been added with the forced scanning of all applications before they are permitted to execute. To do this, Outpost simulates execution of the program in a closed 'sandbox' and tests it for legitimacy before permitting or blocking its actual execution. System performance is unaffected. ImproveNet is enhanced. The community that brings Outpost users and Agnitum security experts together to share configurations now automatically distributes verified rules to protect against the latest threats. Version 4 adds a new set of rules to govern local application interactions on the user's PC, giving a greater level of control over local processes that prevent hijacking of legitimate applications. Improved usability. Version 4 introduces a new "Entertainment Mode" for users playing online games, watching movies or engaging in other activities on the PC that they don't want interrupted. This mode suppresses Outpost prompts - and access decisions are made automatically in the background. Advanced users may also apply macro definitions to customize adaptive firewall rules. Self-protection technology prevents Outpost from being deactivated by viruses, Trojans or spyware, even through the simulation of keystrokes that would cause the firewall to be shut down. Outpost continuously monitors its own files on the hard drive, as well as registry entries, memory status and running services, and blocks any attempted changes by malicious applications. write your comments about the article :: © 2006 Computing News :: home page |