WebCrime

FIREWALLS

Home
THE PROFIT MOTIVE: MyDoom Redux:
MALICIOUS CODE
HORROR STORIES
SPYWARE
SPOOFING
ANTHRAX
VIRUSES BY OTHER NAMES
PROGRAMMING VIA BIOLOGICAL ENGINEERING TECHNIQUES
MYDOOM
WORMS
KEYLOGGER
SPYWARE
HYBRIDS
ANTHRAX ON THE INTERNET
ANTHRAX CHATTER
CELLPHONE VIRUS CHATTER
VIRUS CHATTER
ANTHRAX CHATTER
MICROSOFT CHATTER
"link=bacillus"
MSBLASTER
PHISHING
SWEN
FIREWALLS
TERMS GLOSSARY
MALICIOUS SCRIPTS: THE STATE OF THE ART DELIVERY METHOD
RESOURCES: FIGHTING BACK - FREE UTILITIES
CODE RED
WHAT'S IN A NAME
MICROSOFT
NIMDA
ANTHRAX-NIMDA CONNECTION
SCRIPT KIDDIES VRS ENGINEERS
THE UNLIKELY LADDS
VIRUS ALLERTS
IDENTITY THEFT
HEADS OFF
HEADSUP

 
 
 
 

You can click on any feature to scroll down to its description.

Product Outpost PRO Outpost FREE NIS 2002 NPF 2002 Kerio PF ZA PRO Tiny Sygate Pro Sygate BID McAfee PF ZA
Version 2.0.212.2918 1.0.1817 6.02 6.0 2.1.4 3.7.159 4.5 5.0 5.0 3.6.cbd 4.1 3.7.159
File size (before install), MB 5.17 2.72 110 25 2.05 3.9 4.5 5.2 5.04 5.87 2.02 3.57
Price for home users $39.95 FREE $99.95 $69.95 FREE $49.95 $39.00 $47.95 FREE $39.95 $49.95 FREE
Price for business customers $39.95 FREE $99.95 $69.95 $39.00 $49.95 $39.00 $47.95 $19.95 $39.95 $49.95 n/a
Hackers Protection
Number of Leak Tests blocked 5 2 2 2 5 5 4 5 5 2 3 4
Application / packet level Filtering + / + + / + + / + + / + + / + + / + + / + + / + + / + + / + + / + + / -
Detects Internet attacks + + + + + + + + + + + +
Stateful inspection protocols + - + + + + + + + - + +
Stealth from hackers + + + + + + + + + + + +
Web / Email Protection
Email attachments (worms) qurantine + + + - - + + - - - - +
Blocks Web history (referrer) + + + - - + - - - - - -
Blocks Flash / Banner / Pop-up ads + / + / + - / + / + - / + / + - / + / + - / - / - - / + / + - / - / - - / - / - - / - / - - / - / - - / - / - - / - / -
Filters executable (ActiveX) in web / email + / + + / + + / + + / + - / - + / + - / - - / - - / - - / - - / - - / -
Filters cookies in web / email + / + + / + + / + + / + - / - + / + - / - - / - - / - - / - - / - - / -
Filters active scripts in web / email + / + + / + + / + + / + - / - + / + - / - - / - - / - - / - - / - - / -
Easy of setup and usage
Auto detects apps / network during install + / + - / - + / + + / + - / - - / + - / - - / + - / + + / + + / + - / +
Predefined access levels for apps / system + / + + / + + / + + / + - / + - / + - / + - / - - / - - / - + / + - / -
Automatic update + + + + - - - - - - + -
Can switch between different configurations + - + - + - - - - - - -
Trust address group + - + + + + + + + + - +
Additional Features
Displays active connections / open ports + / + + / + + / + + / + + / + + / - + / + + / + + / + - / - + / + + / -
View / Filter connections history + / + + / + + / + + / + + / - - / - + / - + / + + / + - / - + / + - / -
Passwords protected security settings + - + - + + + + + - - -
Halts / Allows all internet traffic + + + + + + - + + + + +
Parental and employee control + + + - - - - - - - + -
Visual Trace - - + + - + - - - - + -
Alerts messages - - + + + + + + + + + +
Can run hidden from user eyes + - + + - - - + + + - -
Accelerates connection time + + - - - - - - - - - -
Score 37 26 34 29 19 28 17 20 20 12 21 14


The following are descriptions of each feature used in the comparison table above.

Number of Leak Tests blocked — Leak test is a program that tests the efficiency of outbound filtering used by personal firewalls. Leak test in some way are similar to trojans (backdoors) but their methodology is more complicated. There are 5 so called leak test included to this comparison: Leak Test (http://grc.com/lt/leaktest.htm), Yalta (http://www.soft4ever.com/security_test/En/index.htm), TooLeaky (http://tooleaky.zensoft.com/), FireHole (http://keir.net/firehole.html), Outbound (http://www.hackbusters.net/ob.html). top

Application packet level Filtering — Application level filtering enables firewall to monitor the behavior of applications. This kind of filtering should allow specifying individual activities for an application. For example, ”Allow Outlook Express outbound communication using TCP protocol to remote port 80 and remote host mymail.server.com and deny all other activity“ top

Detects Internet attacks — Detection of remote attacks and exploits, such as Nuke, Teardrop, NesTea, IGMP_SYN and others. top

Stateful inspection protocols — Stateful inspection firewall technology keeps a table of active TCP and UDP sessions and is more secure than packet filtering because it allows smaller paths along which traffic can pass. top

Stealth from hackers — Normally, when your computer receives a connection request from another computer to a closed port, it sends an answer back to let the other computer know that the port is closed. In stealth mode, your computer will not respond, making it seem like it is not turned on or not connected to the Internet. top

Email attachments (worms) quarantine — Possibility to neutralize (rename) dangerous attachments in incoming e-mail. top

Blocks Web history (referrer) — When you surf the web your browser can reveal the information about previously visited web sites. Web site operators can use this private info in marketing purposes. This info is called “referrer” and some firewalls can block it. top

Blocks Flash / Banner / Pop-up ads — Ability to block web page advertisement banners (including Flash) and annoying pop-up windows. top

Filters executable (ActiveX) in web / email — Ability to block potentially dangerous executable content (ActiveX) of web pages and email messages. top

Filters cookies in web / email — Ability to allow/block cookies. Cookie — is a small piece of information transferred by the server to a browser and saved on the user's computer. The browser stores this information and sometimes transfers it to the server. top

Filters active scripts in web / email — Ability to block potentially dangerous scripts (Java, Visual Basic etc.) of web pages and email messages. top

Auto detects apps / network during install — Ability to detect and apply applications and local area network and applying the setting for them during the installation. This lets rookie users start using the firewall without any configuration changes. top

Predefined access levels for apps / system — If a firewall has predefined access levels (presets) for applications and network, it means that it will search its application database and suggest to you a set of rules that were worked out by personal firewall developers that are optimum for this application. This very powerful technique lets you create rules with one click and without any special knowledge of ports or protocols. top

Automatic update — Automated separate utility that downloads and installs new Firewall executables and settings for optimal protection against new attacks. This is not to be confused with a “Check for updates” button that just checks if an update is available and gives instructions on how to manually install the update. top

Can switch between different configurations — Ability to create different configurations for you and your family or colleagues, even if you use the same Windows profile. top

Trust address group — Special dialog where you can allow all network activity for selected, trusted home or work place computers without creating special rules for them. top

Displays active connections / open ports — Ability to report about current network status of computer by displaying active connection and open ports. top

View / Filter connections history — Special utility that displays the history of all connections and events. User can filter the information to display any connections or events he or she wants to see. For example, “All connections made by Outlook Express from 9am to 11am on May 11th”. top

Passwords protected security settings — Ability to password protect your settings. top

Halts / Allows all internet traffic — Ability to stop/allow all internet traffic with one click ignoring all firewall rules. top

Parental and employee control — Possibility to block some web sites because of its content, based on a database of such sites, domain names (playboy.com) or keywords in web pages (“explosives”, “violence”, etc) top

Visual Trace — Special utility that can trace the origin of hacker attacking your computer. top

Alerts messages — Pop-up messages which warn you about attacks on your computer or any other dangerous activities of your. top

Can run hidden from user eyes — Possibility to Block unwanted traffic or content in a way that's completely hidden from a user's eyes (also called “Run as service”). top

Accelerates connection time — Caches all resolved DNS names in a special database that significantly decrease connection times to any kind of service or site — WWW, E-mail, News, ICQ, etc. top

Products mentioned here are brand names or registered trademarks of the respective companies.

HOME