home *** CD-ROM | disk | FTP | other *** search
- 35 Single port scan
- 36 Single port scan
- 37 Unknown
- 38 <COMPANY>
- 39 <PRODUCT>
- 40 <PRODUCT>
- 41 MOYARI13
- 42 ARP scan
- 43 1234
- 44 IP spoof
- 45 IGMPSYN
- 46 Scanning for <MALWARE>...
- 47 FAWX
- 48 ~Auto-generated rule for connection
- 49 FAWX2
- 50 ~Auto-generated rule for open port
- 62 KOX
- 100 Process Name
- 101 Attack Blocked
- 102 Start Time
- 103 State
- 104 IP Address
- 105 Port
- 106 Protocol
- 107 Uptime
- 108 Direction
- 109 Reason
- 110 Process Name
- 111 Start Time
- 112 State
- 113 Local Address
- 114 Local Port
- 115 Remote Address
- 116 Remote Port
- 117 Protocol
- 118 Sent
- 119 Recv
- 120 Bps
- 121 Uptime
- 124 Requested Address
- 125 From Address
- 126 To Address
- 127 From Port
- 128 To Port
- 129 Creating Component Control Database...
- 130 Packet Type
- 131 Packet Flags
- 132 TCP Flags
- 133 Packet Size
- 134 IP Packet Size
- 135 Identification
- 136 Blocked Packets
- 137 Updating Program Components...
- 138 <TITLE>HTML document blocked by <PRODUCT></TITLE><BODY><font color="Blue" size="+3"><b>%s</b></font>\n</BODY>\n</HTML>\n<!--
- 139 HTTP/1.0 200 OK
- \nContent-type:text/html
- \nConnection:close
- \nPragma:no-cache
- \n
- \n<HTML><TITLE>Host is blocked by <PRODUCT></TITLE><BODY><font color="Blue" size="+3"><b>%s</b></font>\n</BODY>\n</HTML>\n
- 140 Updating Presets Database...
- 141 Updating <AMW> Database...
- 142 Process ID
- 143 Filename
- 144 Arguments
- 145 Start Time
- 146 Uptime
- 147 Context
- 148 Allow/Block Reason
- 149 Context
- 150 Allow/Block Reason
- 151 Date/Time
- 152 Date/Time
- 153 IP Address
- 154 Date/Time
- 155 DNS Name
- 160 DNS Resolver
- 161 Ports History
- 162 All Connections
- 163 Context
- 164 Process
- 165 Allowed Connections
- 166 Blocked Connections
- 167 Trashcan
- 191 free user
- 192 free license
- 193 trial user
- 194 trial license
- 379 An attempt to modify <PRODUCT> files was prevented.
- 389 An attempt to terminate <PRODUCT> process was prevented.
- 400 An attempt to modify <PRODUCT> startup and configuration parameters was prevented.
- 401 Self-Protection
- 405 An attempt to modify <PRODUCT> kernel memory was prevented.
- 468 No Rule
- 469 Allow All Activity
- 470 Block All Activity
- 471 Learning Mode
- 472 Allow NetBIOS Traffic
- 473 Block NetBIOS Traffic
- 474 ICMPv6 Traffic
- 475 ICMP Traffic
- 476 Allow Once
- 477 Block Once
- 478 Trusted Zone
- 479 Established TCP Connection
- 480 Block RST packets in stealth mode
- 481 NetBIOS broadcast
- 482 Receive non-local packets
- 483 Defining the rule...
- 484 Disable Mode
- 485 Block Transit Packets
- 486 Localhost Connection
- 487 Packet to closed port
- 488 Reject Connection to a Port Opened by the System
- 490 Blocked by Component Control
- 491 FTP Data Connection
- 492 Allow NAT Packets
- 494 Allow connection to <COMPANY> Publisher Service
- 495 Block fragmented packets
- 497 Blocked by Ethernet attack detector
- 498 Blocked by DNS Cache
- 499 DNS cache used instead
- 500 Blocked by NAT
- 501 Blocked by the Attack Detecton component
- 502 Blocked by ID Block
- 503 Blocked by IP Blocklist
- 504 Blocked by Open Process Control
- 505 Blocked by Hidden Process Control
- 514 Port scanning
- 515 Denial of Service
- 516 Fragmented ICMP
- 517 Fragmented IGMP
- 518 Short Fragments
- 519 My Address
- 520 Overlapped Fragments
- 521 Winnuke
- 522 Teardrop
- 523 Nestea
- 524 Iceping
- 525 ICMP
- 527 Opentear
- 528 Nuke
- 529 IGMP
- 530 Port139
- 548 Attack duration time, msec
- 551 Number of different hosts (DoS)
- 589 Malformed IP Options
- 590 RPC DCOM
- 683 RST
- 685 TIDCMP
- 687 RF Poison
- 689 RF Paralyze
- 691 WIN95 Handles
- 693 ARP Unwanted Reply
- 695 Duplicate Gateway IP
- 697 Duplicate Local IP
- 699 Malformed IP Packet
- 701 Closed port weight
- 703 Open port weight
- 705 Max total weight
- 707 Single scan weight
- 1000 Bytes
- 1001 KB
- 1002 MB
- 1003 Bps
- 1004 KBps
- 1005 MBps
- 1101 %d min(s) %02d sec(s)
- 1102 %d hour(s) %d min(s) %02d sec(s)
- 1103 %d day(s) %d hour(s) %d min(s) %02d sec(s)
- 2000 Automatic Rules Creation
- 2001 Rules were automatically created based on presets.
- 2002 Preset
- 2003 Process
- 2005 Rules were automatically created by training mode.
- 3000 <VERSION>
- 5000 Attack Detection Report
- 5001 Attack %s
- 5002 <PRODUCT>
- 5003 Don't show this message again
- 5004 detected
- 5005 host blocked
- 5006 subnet blocked
- 5007 Failed to load <PRODUCT> network operation driver.
- 5008 Action
- 5009 Attacker IP
- 5010 Attacker MAC
- 5011 <PRODUCT> functionality is limited: failed to load AFW.SYS driver.
- 63167 Cannot process packet
- 63168 Closing connection for completed application
- 63169 Lifetime
- 63170 Block rawsocket connection
- 63171 Allow rawsocket connection
-