It is important to note that Outpost Personal Firewall does not just monitor applications. It also monitors each component of each application. This is a significant improvement over other personal firewalls because applications typically have dozens of modules, any of which can easily be substituted for by virus or Trojan makers.
If a component of an application has been changed and the application is about to establish a connection, Outpost Firewall will ask you to allow or permit this changed component. The purpose of Component Control is to make sure these components are not fake and malicious.
Some Trojan horses can be injected into a computer system as a module of a legitimate application (for example, your browser) and thus gain the privileges needed for it to connect to the hacker who configured the Trojan.
Outpost Firewall allows you to view the components it monitors for each application. It also allows you to remove any monitored component from the trusted list.
Outpost Firewall uses three levels in Component Control:
Normal û monitors all new and updated components and remembers the legitimate ones.
Maximum û monitors all components.
Off û switches off Component Control so that it no longer monitors each component of applications.