|
Category | Features | Description |
|
Personal firewall | Program access management | (i) Notifies user by detecting the execution of the program communicating with the outside of the user’s PC |
(ii) Allows/blocks settings by IP address and port |
IP address access management | (i) Allows or blocks designated IP addresses |
Port access management | (i) Allows or blocks designated ports |
|
Shared folder control/monitoring | Shared access management | (i) Allows or blocks access to shared folder on the user’s computer from other computers |
Shared folder management | (i) Disables shared folder |
|
Network | Network connection management | (i) Displays allowed TCP/UDP connection information for external communication |
(ii) Alerts or blocks the port when it is a known hacking tool |
(iii) Counteracts self-disguised and hidden hacking tools when detection is difficult |
Network monitoring | (i) Displays graph of the amount of network inbound and outbound traffic |
|
Real-time hacking tool detection/prevention | Known hacking tool detection and prevention | (i) Inspects hacking tool process |
(ii) Detects and blocks key loggers |
(iii) Detects and blocks console-based hacking programs |
(iv) Detects and blocks Back Orifice hidden process |
|
Logging | Usage history | (i) Records program access management information |
(ii) Displays logs history by date |
|