Overview of personal firewalls
by Mirko Zorz - for Help Net Security
With the constant rise of permanent broadband connections that have many workstations online 24/7, there has been a growth in the number of attacks. In order to get a certain level of protection and piece of mind, the home user should install a personal firewall. If you are not familiar with how a firewall works I suggest you visit this link and find out more. For a lot more in-depth articles on the subject visit this section of HNS.

There are a lot of products out there so I decided to make a brief overview of some of the personal firewalls offered. Here we go...

MindSoft Firewall 2.6
Website: MindSoftWeb.com - [ Download ]

Mindsoft Firewall

MindSoft Firewall's setting extremely simple for the user. This is very helpful for people new to firewalls but if you eventually want to learn something more, the help file won't help you because it's very brief so you'll have to look elsewhere.

Kerio Personal Firewall 2.1.4
Website: Kerio.com - [ Download ]

Kerio Personal Firewall

Kerio Personal Firewall is a small and easy to use system designed for protecting your computer against hacker attacks and data leaks. It is based on the ICSA certified technology used in the WinRoute firewall.

Sygate Personal Firewall 5.0
Website: Sygate.com - [ Download ]

Sygate Personal Firewall

Sygate Personal Firewall offers unparalleled protection against malicious intrusion attempts by hackers, script kiddies, and cracks. It uses the combined power of bi-directional intrusion detection, vulnerability assessment, and extensive logging and forensics capabilities.

VisNetic Firewall 1.0.3
Website: Deerfield.com - [ Download ]

VisNetic Firewall

VisNetic Firewall falls into a class of firewalls called Stateful Inspection Firewalls. They examine more than just the "to" and "from" addresses in the data packets, and do not require a proxy for every application being accessed. Both the installation and the configuration are very simple. The help file is very well written.


Applying machine learning techniques on contextual data for threat detection

The question is on every CIO's and security officer's mind: What are the most efficient techniques to detect threats to cloud services?

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Wed, Oct 7th