Outpost Firewall Pro ver. 3.5.738.6327 (460) Beta
Outpost Firewall Pro, provides a superior arsenal of defense against PC infiltration by denying unauthorized access by remote hackers and protecting against data theft, denial-of-service attacks, privacy violation, Trojan horses, spyware and more. Four major criteria define Outpost Firewall Pro: security, control, privacy and ease of use.Outpost Personal Firewall PRO Features:
- Attack Detection. The Powerful Intrusion Detection System built into the program protects from existing and future hacker attacks. The IDS module screens inbound data and determines its legitimacy either by comparing it against a set of known attack fingerprints or by performing behavior evaluation analysis.
- Anti-spyware defenses and privacy protection. Outpost 3.0’s built-in AntiSpyware plug-in safeguards your computer against spyware infection and the loss of confidential information. Spyware is blocked at every possible stage – installation, activation, transmission of information, and re-installation. No more nagging pop-ups, no browser modifications, no search and homepage hijacking, and no unauthorized leaking of data from the computer. Plus, any data you define as confidential is forever blocked from being sent anywhere.
- Unique network security. Outpost 3.0’s new Ethernet protection module combats attacks on your connectivity, including: interception of outbound chat sessions, spoofing attacks designed to disable or disrupt your connections, and illegal communication initiation requests that encroach on your WiFi zone.
- Packet/Application Filtering. By implementing per-process data filtering, Outpost serves as a virtual checkpoint for incoming and outgoing application data. Based on its discretion or following the user’s instructions, it can configure how each particular application communicates over the LAN or the Internet. With application access rules, any unwanted program can easily be denied Internet access if the circumstances warrant it. Packet filtering is a lower-level filtration technique that allows the user to select which protocols, ports and remote addresses can be accessed from a user machine.
- Safeguarding Active Content. Outpost’s Active Content plug-in can selectively prevent the execution, installation and propagation of a third-party scripting code running itself surreptitiously inside the Internet browser. The browser often represents a medium for spyware, viruses and worm infestations.
- Attachment Quarantine. The Attachment Quarantine protects Outpost users from potentially dangerous e-mail attachments that may contain viruses, worms and other malware and allows users to customize which types of attachments Outpost should block.
- Network Activity Monitoring. Monitoring shows every connection between your machine and other computers on the Internet or LAN. It’s a handy tool to know what’s happening on a connected PC at any given time and to allow users to quickly stop unwanted Internet communications.
- Events Logging. Outpost’s Log Viewer provides the history of your computer activity in a most detailed and complete form. With this vital tool, you can browse through what’s happened on a computer in the past or pinpoint a problem early on and easily correct it.
- Content Management. The Content plug-in allows users to compile a list of entries that would be blocked from being displayed throughout visited web sites. Parents that do not want their kids exposed to inappropriate content would find great use for this feature.
- Surfing Privacy Protection. By enabling a customizable block of cookie files and external referring, users can maintain a high level of surfing confidentiality on unknown sites and at the same time be less secretive with predefined trusted sites.
- Embedded Code Protection. By providing advanced mechanisms of Open Process Control, Hidden Process Control and Component Control, Outpost effectively protects the host system from malicious attempts of a foreign code implanted within the system to divulge personal data or hijack an application.
- Ports Stealthing. Being visible on the network is only good when a person who sees you is authorized to do so. Outpost makes sure that the host computer is hidden from outsiders, making it unsusceptible to network probes and intruder attempts to establish rogue communication channels.
*** Ease of Use.
- Effortless Installation. Two options for installation are offered to the user. Automatic installation takes care of the entire installation as well as the initial configuration phase and is most suitable for an inexperienced user. A more refined option is the Installation Wizard, which allows users to customize the process of installation and choose specific parameters.
- Instant, context-sensitive help. Every user prompt or request for the creation of a new rule in Outpost 3.0 is accompanied by an instant automatic recommendation for the best course of action. Configuring your firewall can now be error-free, making your protection so much stronger, as well as increasing your understanding of the program.
- Automatic Program and LAN Access Rules. The program automatically configures the computer’s LAN settings and protects it from incoming Internet connections. Predefined rules for known applications are created to spare the user the need to manually create program access rules for well-known or frequently used programs.
- Easy Program Updates. When an update to the program has been released, it is easily deployed through the program’s automatic update feature, which retrieves the latest version automatically from the vendor’s server and applies it upon user authorization.New in this release:
- New presets for system rules and basic applications (Outpost, aupdrun, feedback)
- SDK for plug-ins
- Third-party plug-ins support
- Rules were not created from the connection context menu in Show Network Activity window
- Application identification in presets issues
- Rules were duplicated in presets after update
- Anti-Spyware plug-in did not detect cookies
- Spyware objects found during Quick system scan could not be deleted
- Anti-Spyware plug-in did not detect viruses in running processes but detected them during hard drive scan
- Password for the configuration was checked after the open file dialog was displayed
- Not only the current object was scanned during the context scanning
- Real-time protection window was displayed not on the top of other windows
- Rules wizard window was displayed after deleting the spyware object
- Number of records in quarantine was increased after each start of the same Trojan after the quarantine was cleared
- Issues while adding spyware to Ignore list
- Learn window was displayed too slowly
- Slow configuration update during presets update, excess changes in rules contexts
- Outpost Firewall crashed during Anti-Spyware monitor work
- Ability to edit application rules and enable/disable ImproveNet in case when the configuration is protected by password and rules auto creation mode is used
- Anti-Spyware could find 0 (zero) spyware objects
- In Anti-Spyware plug-in Ignore list, clearing the check box did not work (object was still ignored)
- Unclear behavior of the Modify button in LAN Settings > Add dialog
- Anti-Spyware could not delete the registry keys
- Outpost Firewall could hang if dragging application between groups in the Options > Application dialog during spyware scan
- Disabled application rules were enabled after presets update
- Update from Outpost Firewall Pro 1.0 and 2.0 did not work
- Interface and localization issues