About Component Control

It is important to note that Outpost Personal Firewall does not just monitor applications. It also monitors each component of each application. This is a significant improvement over other personal firewalls because applications typically have dozens of modules, any of which can easily be substituted for by virus or Trojan makers.

If a component of an application has been changed and the application is about to establish a connection, Outpost Firewall will ask you to allow or permit this changed component. The purpose of Component Control is to make sure these components are not fake and malicious.

Some Trojan horses can be injected into a computer system as a module of a legitimate application (for example, your browser) and thus gain the privileges needed for it to connect to the hacker who configured the Trojan.

Outpost Firewall allows you to view the components it monitors for each application. It also allows you to remove any monitored component from the trusted list.

Outpost Firewall uses three levels in Component Control:

Related links

Viewing Components

Changing Component Control Levels

Removing Components