Outpost firewall Comparision Chart

Firewalls

Moderator: 127.0.0.1

Outpost firewall Comparision Chart

Postby wacky-sung » Wed Apr 09, 2003 12:12 pm

Here is the description claim by outpost firewall.

Code: Select all
The following are descriptions of each feature used in the comparison table above.
Allows custom rules - Lets you create detailed rules for each application. For example, "Allow Outlook Express outbound communication using TCP protocol to remote port 80 and remote host mymail.server.com and deny all other activity". If a firewall has only "Allow All" or "Block All", it cannot specify individual activities for an application. top

Rule assistant - With "Rules Wizard" (also called "Rule Assistant" or "Learning mode") you do not need to create any rules before running an application. "Rules Wizard" pops up with a list of available options when each application first tries to connect to the Internet or a network. After you select one of the options, Rules Wizard generates a rule automatically and stores it in your configuration. top

Stealth mode - Normally, when your computer receives a connection request from another computer to a closed port, it sends an answer back to let the other computer know that the port is closed. In stealth mode, your computer will not respond, making it seem like it is not turned on or not connected to the Internet. top

Application authentication (MD5) - If your firewall supports application authentication and if you create a rule for some application, this application will be digitally signed by the firewall. This feature prohibits rogue programs, such as a Trojan renamed to ICQ.exe, to trick your Firewall that it is a legitimate ICQ program. top

ICS support - If a firewall supports ICS (Microsoft Internet Connection Sharing), it can be installed in an ICS server (gateway) and will allow ICS clients to gain access to the Internet. top

ICMP rules - Possibility to allow or block some inbound or outbound ICMP packets. For example, you can deny any response to a "ping" command so it will put your computer into stealth mode for crackers. top

Presets for system traffic - If a firewall has presets for system traffic, it means that it creates a set of rules right after installation that allows some kind of common system activity (DNS, DHCP, Multicast, etc.) top

Presets for applications - If a firewall has presets for applications, it means that it will search its application database and suggest to you a set of rules that were worked out by personal firewall developers that are optimum for this application. This very powerful technique lets you create rules with one click and without any special knowledge of ports or protocols. top

Glnet. top

Application authentication (MD5) - If your firewall supports application authentication and if you create a rule for some application, this application will be digitally signed by the firewall. This feature prohibits rogue programs, such as a Trojan renamed to ICQ.exe, to trick your Firewall that it is a legitimate ICQ program. top

ICS support - If a firewall supports ICS (Microsoft Internet Connection Sharing), it can be installed in an ICS server (gateway) and will allow ICS clients to gain access to the Internet. top

ICMP rules - Possibility to allow or block some inbound or outbound ICMP packets. For example, you can deny any response to a "ping" command so it will put your computer into stealth mode for crackers. top

Presets for system traffic - If a firewall has presets for system traffic, it means that it creates a set of rules right after installation that allows some kind of common system activity (DNS, DHCP, Multicast, etc.) top

Presets for applications - If a firewall has presets for applications, it means that it will search its application database and suggest to you a set of rules that were worked out by personal firewall developers that are optimum for this application. This very powerful technique lets you create rules with one click and without any special knowledge of ports or protocols. top

Global rules - Ability to create rules that apply to all applications or that allow or block low level system network activity. These are not only application level rules, but also network rules based on particular IP addresses. top

Active content - Ability to block ActiveX, Java Applets, Java/Visual Basic Scripts and Pop-up windows in web pages. top

Privacy guard - Ability to block cookies and referrers in web pages. top

Advertisement blocking - Ability to block web page advertisement (banners). top

Parental control - Possibility to block some web sites because of its content, based on a database of such sites, domain names (playboy.com) or keywords in web pages ("explosives", "violence", etc) top

Active content (e-mail) - Ability to block ActiveX, Java Applets, Java/Visual Basic Scripts and Pop-up windows in incoming e-mail. top

Dangerous attachments - Possibility to neutralize (rename) dangerous attachments in incoming e-mail. top

Plug-ins support - Opportunity for third party developers to create plug-ins that easily expand a Firewall's capabilities. top

Update utility - Automated separate utility that downloads and installs new Firewall executables and settings for optimal protection against new attacks. This is not to be confused with a "Check for updates" button that just checksobal rules - Ability to create rules that apply to all applications or that allow or block low level system network activity. These are not only application level rules, but also network rules based on particular IP addresses. top

Active content - Ability to block ActiveX, Java Applets, Java/Visual Basic Scripts and Pop-up windows in web pages. top

Privacy guard - Ability to block cookies and referrers in web pages. top

Advertisement blocking - Ability to block web page advertisement (banners). top

Parental control - Possibility to block some web sites because of its content, based on a database of such sites, domain names (playboy.com) or keywords in web pages ("explosives", "violence", etc) top

Active content (e-mail) - Ability to block ActiveX, Java Applets, Java/Visual Basic Scripts and Pop-up windows in incoming e-mail. top

Dangerous attachments - Possibility to neutralize (rename) dangerous attachments in incoming e-mail. top

Plug-ins support - Opportunity for third party developers to create plug-ins that easily expand a Firewall's capabilities. top

Update utility - Automated separate utility that downloads and installs new Firewall executables and settings for optimal protection against new attacks. This is not to be confused with a "Check for updates" button that just checks if an update is available and gives instructions on how to manually install the update. top

Multilanguage interface - Ability to use a personal firewall in several languages. Third party, unofficial translations that cannot be downloaded from the firewall manufacture's web site do not count. top

Multiple users/configuration - Ability to create different configurations for you and your family or colleagues, even if you use the same Windows profile. top

Log utility - Logging of network activity. top

Scanning detection - Detection of port scanning (port probes). top

Remote attack detection - Detection of remote attacks and exploits, such as Nuke, Teardrop, NesTea, IGMP_SYN and others. top

DNS cache - Caches all resolved DNS names in a special database that significantly decrease connection times to any kind of service or site - WWW, E-mail, News, ICQ, etc. top

Trusted IP - Special dialog where you can allow all network activity for selected, trusted home or work place computers without creating special rules for them. top

Remote administration - Ability to change a personal firewall configuration from a remote PC (sometimes using a web interface). top

Logging to remote PC - Ability to log and report selected network activities to a remote PC (using Syslog, for example). top

Invis if an update is available and gives instructions on how to manually install the update. top

Multilanguage interface - Ability to use a personal firewall in several languages. Third party, unofficial translations that cannot be downloaded from the firewall manufacture's web site do not count. top

Multiple users/configuration - Ability to create different configurations for you and your family or colleagues, even if you use the same Windows profile. top

Log utility - Logging of network activity. top

Scanning detection - Detection of port scanning (port probes). top

Remote attack detection - Detection of remote attacks and exploits, such as Nuke, Teardrop, NesTea, IGMP_SYN and others. top

DNS cache - Caches all resolved DNS names in a special database that significantly decrease connection times to any kind of service or site - WWW, E-mail, News, ICQ, etc. top

Trusted IP - Special dialog where you can allow all network activity for selected, trusted home or work place computers without creating special rules for them. top

Remote administration - Ability to change a personal firewall configuration from a remote PC (sometimes using a web interface). top

Logging to remote PC - Ability to log and report selected network activities to a remote PC (using Syslog, for example). top

Invisible mode - Possibility to Block unwanted traffic or content in a way that's completely hidden from a user's eyes (also called "Run as service"). top

Password protect settings - Ability to password protect your settings. top

Score - Total features. top


Here is the link.
http://www.agnitum.com/php_scripts/compare.php

Homepage
http://www.agnitum.com/products/outpost/compare.html
wacky-sung
End-Loser
End-Loser
 
Posts: 68
Joined: Mon Apr 07, 2003 4:30 am

Return to Firewalls

Who is online

Users browsing this forum: No registered users and 1 guest

cron