About Ashampoo FireWall

Previous TopicProgram InfoNext Topic

 

 

About Ashampoo FireWall ?

If you dont have a degree in computer science, using a firewall program can be quite frustrating. In addition to all the confusing jargon, current firewalls are getting to be very big programs. Sometimes you have the feeling that youre installing an entire office suite instead of a basic network tool. The brand-new Ashampoo FireWall is different. Its Configuration Assistant guides you through every step of the simple setup process. And Easy Mode makes using it a breeze you dont need any special technical knowledge and everything is explained clearly.

Ashampoo FireWall is also amazingly compact. Even with its four additional security tools its a tiny program that uses very little memory and computer resources. You get the heavy-duty protection without heavyweight overload on your system. You computer is protected, as soon as Ashampoo FireWall is installed.

 

Features...

 

Heavy-duty firewall protection: Monitors all your computers network activity and protects you against both incoming and outgoing connections.

 

Easy Mode: Get full protection in seconds with Easy Mode and the Configuration Assistant. No expert knowledge required.

 

Expert Mode: Experience users can activate this mode for powerful additional capabilities.

 

Simple and compact: Self-explanatory user interface. Very small program that uses minimum memory and resources

 

Learning Mode: Automatically identifies programs that try to make connections and lets you decide whether you want to allow them. One-click operation in Easy Mode or full configuration in Expert Mode.

 

Rules: Create rules for every program that controls how they can access the network. One-click in Easy Mode or full configuration in Expert Mode.

 

Block All: One-click panic button for emergencies that lets you block all traffic, for example if you are under attack or suspect that a malicious program is active.

 

Monitor local connections: Ashampoo FireWall can also monitor the local connections used inside your computer. Useful for identifying suspicious activity. Can be enabled or disabled.

 

Monitor LAN connections: Monitor all the local LAN traffic into and out of your computer. Can be enabled or disabled.

 

Connection log: Detailed logging of all internal, LAN and Internet connections with date, time, application, port used and IP address.