Torrent Hash - Hash of all existing torrents
Please, pay attention to the fact that you are about to download the torrent NOT from torhash.net
torhash.net is just a torrent search engine, no torrents are hosted here.

Agnitum Outpost Firewall Pro 3.0.543.5722 (431) - Final

Infohash:

E0785093B3283F948F5621DFAACCFDAB3286F875

Type:

Applications

Title:

Agnitum Outpost Firewall Pro 3.0.543.5722 (431) - Final

Category:

Applications/Windows

Uploaded:

2005-09-26 (by useros)

Description:

Outpost Firewall Pro, provides a superior arsenal of defense against PC infiltration by denying unauthorized access by remote hackers and protecting against data theft, denial-of-service attacks, privacy violation, Trojan horses, spyware and more. Four major criteria define Outpost Firewall Pro: security, control, privacy and ease of use. Outpost Firewall PRO Benefits: NEW! Protection from spyware and identity theft New anti-spyware capabilities built into the program protect your computer against the rapidly increasing threats from spyware and ID theft. Spyware cannot enter, activate on, or transmit information out of computers protected by Outpost 3.0. The ID Block feature lets you determine which specific items of personal information, for example bank account numbers, are blocked from ever leaving the computer. Know what's happening on your PC at all times Outpost?s Network Activity Monitor watches every connection between your computer and the Internet, alerting you immediately to any communications that may be unauthorized so you can take appropriate action. Automatic, intelligent protection against hacker attacks Outpost?s Attack Detection automatically blocks network probes, zombie attacks, and other remote attempts to access your PC, using its continually-updated intrusion definitions database. Control how applications communicate Outpost?s Component Control, Hidden Process Control, and Open Memory Control let you decide what applications and processes on your PC are allowed to do and what - if any- outbound connections they may make. Spyware can?t phone home from an Outpost-protected PC. Understand the threats Every time Outpost 3.0 asks you for information regarding action to be taken, the new Smart Advisor helps you to choose the best course of action by displaying context-sensitive hints and live advice. So you?ll never need to wonder whether you?ve made the right security decision, and you?ll learn something new about firewall security every time. Outpost Personal Firewall PRO Features: Security Attack Detection The Powerful Intrusion Detection System built into the program protects from existing and future hacker attacks. The IDS module screens inbound data and determines its legitimacy either by comparing it against a set of known attack fingerprints or by performing behavior evaluation analysis. Anti-spyware defenses and privacy protection Outpost 3.0?s built-in AntiSpyware plug-in safeguards your computer against spyware infection and the loss of confidential information. Spyware is blocked at every possible stage ? installation, activation, transmission of information, and re-installation. No more nagging pop-ups, no browser modifications, no search and homepage hijacking, and no unauthorized leaking of data from the computer. Plus, any data you define as confidential is forever blocked from being sent anywhere. Unique network security Outpost 3.0?s new Ethernet protection module combats attacks on your connectivity, including: interception of outbound chat sessions, spoofing attacks designed to disable or disrupt your connections, and illegal communication initiation requests that encroach on your WiFi zone. Packet/Application Filtering By implementing per-process data filtering, Outpost serves as a virtual checkpoint for incoming and outgoing application data. Based on its discretion or following the user?s instructions, it can configure how each particular application communicates over the LAN or the Internet. With application access rules, any unwanted program can easily be denied Internet access if the circumstances warrant it. Packet filtering is a lower-level filtration technique that allows the user to select which protocols, ports and remote addresses can be accessed from a user machine. Safeguarding Active Content Outpost?s Active Content plug-in can selectively prevent the execution, installation and propagation of a third-party scripting code running itself surreptitiously inside the Internet browser. The browser often represents a medium for spyware, viruses and worm infestations. Attachment Quarantine The Attachment Quarantine protects Outpost users from potentially dangerous e-mail attachments that may contain viruses, worms and other malware and allows users to customize which types of attachments Outpost should block. Control Network Activity Monitoring Monitoring shows every connection between your machine and other computers on the Internet or LAN. It?s a handy tool to know what?s happening on a connected PC at any given time and to allow users to quickly stop unwanted Internet communications. Events Logging Outpost?s Log Viewer provides the history of your computer activity in a most detailed and complete form. With this vital tool, you can browse through what?s happened on a computer in the past or pinpoint a problem early on and easily correct it. Content Management The Content plug-in allows users to compile a list of entries that would be blocked from being displayed throughout visited web sites. Parents that do not want their kids exposed to inappropriate content would find great use for this feature. Privacy Surfing Privacy Protection By enabling a customizable block of cookie files and external referring, users can maintain a high level of surfing confidentiality on unknown sites and at the same time be less secretive with predefined trusted sites. Embedded Code Protection By providing advanced mechanisms of Open Process Control, Hidden Process Control and Component Control, Outpost effectively protects the host system from malicious attempts of a foreign code implanted within the system to divulge personal data or hijack an application. Ports Stealthing Being visible on the network is only good when a person who sees you is authorized to do so. Outpost makes sure that the host computer is hidden from outsiders, making it unsusceptible to network probes and intruder attempts to establish rogue communication channels. Ease of Use Effortless Installation Two options for installation are offered to the user. Automatic installation takes care of the entire installation as well as the initial configuration phase and is most suitable for an inexperienced user. A more refined option is the Installation Wizard, which allows users to customize the process of installation and choose specific parameters. Instant, context-sensitive help Every user prompt or request for the creation of a new rule in Outpost 3.0 is accompanied by an instant automatic recommendation for the best course of action. Configuring your firewall can now be error-free, making your protection so much stronger, as well as increasing your understanding of the program. Automatic Program and LAN Access Rules The program automatically configures the computer?s LAN settings and protects it from incoming Internet connections. Predefined rules for known applications are created to spare the user the need to manually create program access rules for well-known or frequently used programs. Easy Program Updates When an update to the program has been released, it is easily deployed through the program?s automatic update feature, which retrieves the latest version automatically from the vendor?s server and applies it upon user authorization. ------------------KEY BEGIN------------------ 0CmjrABRhKUGClFQp0uSTN+3p9BWxQvlK0nMErEu bwCeI/2iynDlcX4pzGEAADO/KXAXZGMxB1Zo8RH/ U7j2hAXwU/tW4tEMY4qkIXFwzlHnjeZ2ELr8TD3e akQWjjorZ0t6RT80J7d1t3VYNV9wGIxJ043US4yJ aDkVZF9zVFY5odTHWqENNx5f48oBPdgBzZg== ------------------KEY END-------------------- ------------------KEY BEGIN------------------ 0g7HlVhAdz8u0Wh5eFbGWC5pW0ekcH8Ot34vyCx KzCqHOzVPr6rED1nGWa0W4Sy/wuyey112mD0VZ UMFp0Ti4L2KFvAgsjodwlERO5PXZv60W7aLsFvSF nuPfej2MNAVYBS0pQRtFoRrwpWUSN9i sgnbcUtg egyyFX9b4tOLGL5SPXihrGQ== ------------------KEY END--------------------

Files count:

1

Size:

4.50 Mb

Trackers:

udp://tracker.openbittorrent.com:80
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969