Agnitum Outpost Firewall Pro 2008 Build 6.0.2279.251.0482(with serial key).rar (Size: 49.88 MB) (Files: 1)
Agnitum Outpost Firewall Pro 2008 Build 6.0.2279.251.0482(with serial key).rar
Agnitum Outpost Firewall Pro 2008 Build 6.0.2279.251.0482
Outpost Firewall Pro provides a superior arsenal of defense against PC infiltration. Outpost ensures your online security with solid protection against all Internet-borne threats. Outpost is the first personal firewall developed with Open Architecture. It is also the first personal firewall that supports plug-ins. Sample plug-ins are included to show how this revolutionary technology can easily be employed for such tasks as Intrusion Detection, Advertisement Blocking, Content Filtering, E-mail Guard, and Privacy Control. It is equipped with every feature a personal firewall should have. It is the most functional firewall in the world. It supports all the latest security techniques and features such as: Full Stealth Mode, Anti-Leak, and MD5 Authentication.
Being online is fraught with dangers: Internet worms, spyware agents, Trojan horses, hijackers and more can wreak havoc, causing anything from slow performance to system crashes to full-blown identity theft. And to provide you with the kind of protection you need in these days of cyberthieves and online extortionists, your firewall must be able to monitor all inbound and outbound traffic and protect you from any unauthorized intrusion by rendering your PC invisible to anything that you haven?t authorized to see it.
What you get:
* Advanced firewall for secure connections
* Antispyware to keep your PC spyware-free
* Host protection to block zero-day threats
* Web control to protect your PC from web-borne threats
? Safety on the Internet. The two-way firewall stops inappropriate or malicious access to your computer from both internal (LAN) and external (Internet) sources. As a frontline defense, it prevents malware from spreading or ?phoning home?, providing protection against hackers, loss of personal data, unknown malware, and unauthorized program activity.
? Preemptive threat protection. Outpost?s Host Protection module monitors how programs interact to protect your system against high-level security breaches and has passed all well-known leaktests to prevent unauthorized transmission of information from your PC.
? No more spyware! Eliminate spyware with Outpost?s dedicated antispyware utility. Regular updates and always-on monitoring ensure that spyware cannot activate and cause damage to your data or divert your applications.
? Secure web surfing. The versatile Web Control module safeguards you against the Internet?s darker side. It steers you away from websites infected with drive-by downloads, prevents the inadvertent disclosure of personal information, limits your exposure to potentially unsafe web properties, and keeps your identity private.
? Bulletproof self-defense. Outpost cannot be deactivated by targeted attacks, ensuring continuity of protection.
? Power without complexity. Whether you?re a security novice or expert, you can easily configure Outpost Firewall Pro to meet your needs. Thanks to automated and context-sensitive help, the firewall can learn how to handle alerts and make decisions for you, so you can focus on what you want to do, and leave the security to Outpost!
Supported platforms: 32- and 64-bit Windows (Vista, XP, Server 2003), Windows 2000 (SP3 and above).
Changes in Outpost Firewall Pro 2008 (build 6.0.2279.251.0482) February 26, 2008:
The following improvements are introduced:
* Compatibility with Windows Vista SP1
* Compatibility with Windows Server 2008
* Ability to automatically create rules for applications signed by trusted vendors
* Ability to disable content filtering for specific applications
* Ability to block Flash banners and ads by GET request
* Auto-Learn mode improvements
The following issues are resolved (only significant ones are listed):
* Anti-Leak Control:
o PC could freeze on Anti-Leak Control prompt if Punto Switcher was installed on the computer
o Windows 2000 system could freeze on Anti-Leak Control learn dialog
o FEEDBACK.EXE service issues (incl. Anti-Leak Control false positives, crash on system startup)
o Anti-Leak Control false positives if processes write to their own memory on Vista32
* Performance and stability:
o Outpost could crash on downloading updates
o Outpost could crash on displaying network activity
o Outpost could crash on Vista x64
o Slow start on Vista 64
o CPU high load on deleting files to Recycle Bin on Vista 64
o System slowed down while importing large list of advertisement keywords
o Compatibility issues (McAfee Security Center 8.0, BitDefender 10.2, nProtect GameGuard, CA Anti-Virus 188.8.131.52)
* Update and installation:
o Error 101 while updating the product
o Some folders were not deleted after installation over Outpost Security Suite 2007
o Configuration was not imported correctly if installing over Outpost Security Suite 2007 or Outpost Firewall Pro 4.0
o Windows Security Center integration issues
o Service could not be unloaded if exiting the product while updating Outpost on Vista 32
o Scan history was not preserved after switching to background scanning mode
o Incorrect details of registry keys were displayed in quarantine
o Web Control exclusions did not work
o Issues while processing IMAP protocol traffic
o Operation logic in case of "Allow Once" response to Rules Wizard prompt is changed
o Files which size exceeded the specified value were checked irrespective of the corresponding setting
o NAT Zone flag did not work correctly if LAN was marked as trusted
o More minor fixes
* Preemptive threat protection
Outpost Firewall Pro provides the first line of defense against malicious software by proactively controlling how programs behave and interact on a PC and preventing security breaches. The Host Protection module proactively monitors for and blocks sophisticated hacking techniques used to compromise or steal data. By analyzing threats and displaying actionable alerts, Host Protection blocks zero-day attacks and other unauthorized activities, providing advanced protection against botnets, rootkits and inadvertent data disclosure. New! This latest version extends the range of monitored events and operations for even greater and more customizable protection.
Today's malware frequently seeks to shut down security software to make its own infection process easier. By incorporating solid tamper-proof protection for all its components, Outpost Firewall Pro makes it impossible for anyone except the authorized user of the program to disable or close active protection.
* Essential spyware protection
Outpost's Anti-Spyware module safeguards PCs against the threat of spyware, which can range from displaying annoying ads to hijacking your browser homepage to stealing your identity and confidential data. Spyware is blocked at every possible stage ? installation, activation, transmission of information and re-installation. The on-demand scanner scours the system for traces of deactivated spyware and erases them completely.
Network Security & Continuity
* Connection security
The two-way firewall monitors your computer?s inbound and outbound connections and prevents local and remote unauthorized network access. It conceals access ports, making your presence on the Internet invisible. The Ethernet Protection module guards your network connections and prevents insider attacks by controlling the transmission of data over the network. This eliminates the potential risk for data such as chat windows or authenticated browser sessions to be delivered to the wrong destination or intercepted while in transit.
* Application access control
The firewall controls which programs are allowed to access the Internet, proactively protecting your PC against both zero-day threats and malware attempts to ?phone home?.
* Comprehensive coverage
Outpost Firewall Pro secures all types of connections (Ethernet, WiFi, DSL, cable, cellular, and dial-up), automatically applying the necessary security settings when the computer is connected to a new provider.
* Intrusion protection
The Attack Detection module automatically blocks known types of hacker attacks from entering your computer.
Privacy & Web Safety
* Unsafe web site access restriction
New! Outpost Firewall Pro can optionally alert and block access to potentially malicious or unwanted web sites based on a predefined list of URLs. This filtering ensures you won?t become a victim of inadvertent drive-by malware infection or phishing attacks that are looking to steal your passwords, login information and other sensitive data. The list of blocked sites is updated via the automatic anti-spyware updates and can be edited to reflect your preferences.
* Safe repository for personal data
Any confidential information ? for example, bank account numbers and passwords ? that you define using ID Block is blocked from leaving the confines of your PC through communication channels such as IM, web or email. ID Block protects you against identity theft and phishing attacks that target personal confidential information. Plus, it ensures that no-one else ? including other members of your household - can accidentally or deliberately disclose this information on the web.
* Ad-free, anonymous surfing
By managing cookies and external referral URLs, Outpost lets you maintain a high level of privacy when visiting shopping, entertainment or news sites while at the same time allowing trusted sites to collect only the information needed to personalize pages for you. Additionally, Outpost Firewall Pro lets you limit the elements displayed on web pages, providing cleaner and faster browsing. You can even define which sites are permitted/not permitted to display images, rotate advertising banners, execute external code such as ActiveX or Java scripts, or deliver pop-ups. New! The latest version of Outpost ensures compatibility with even the most complex and sophisticated websites, delivering smooth performance and heightened online safety.
Tracking & Control
* Network activity monitoring
Outpost's Network Activity Monitor shows every connection your PC makes with other computers on the Internet or local network, so you can see what's happening on your PC at all times and quickly close down any unauthorized connections.
* Password-protection, multiple configuration profiles
You can set passwords to protect your configuration from accidental or deliberate modification, as well as create and use multiple configuration profiles to suit your current risk exposure. For adcanced users, the ability to construct multiple restore points through the save/load configuration command is a big plus.
* Basic logging
New! Outpost?s old Log Viewer has been replaced by a plain-text log database format that makes it easier to import, process and maintain records of past activities.
* IPv6 support
The new network connection protocol extensively used in Windows Vista, IPv6, is fully recognized, filtered and its data protected. The protocol is the evolution of its predecessor, IPv4, and provides a number of scalability, automation and security improvements.
* Adaptive firewall rules
When traveling with your laptop, or changing ISP, you don?t need to manually adjust your security for new connection settings - Outpost handles it automatically by designating connection-specific parameters such as DNS or gateway server addresses as environment variables.
* Entertainment mode for uninterrupted gameplay and video viewing
While you play full-screen games or watch videos on your PC, Outpost's Entertainment Mode ensures the program won't interrupt you with alerts if it detects new activity. New activity notifications are handled in the background without sacrificing current protection levels. You can customize which applications will automatically trigger the switch to Entertainment Mode.
* Support for 64-bit Windows
Outpost Firewall Pro has been specifically designed to work with 64-bit Windows architecture, so that you can experience the benefits of 64-bit computing without worrying about security.
Convenience and Ease of Use
* Auto-learning mode
When Outpost is first started, it runs in a special ?learning mode? where all alert notifications are suppressed. During this time, the program is silently learning your typical program activity and firewall-monitored connections. After the learning period is over, Outpost reverts to normal mode and will prompt for a response only when new activity is seen, dramatically reducing the number of alerts requiring your involvement.
* Automatic configuration
Rules for most programs that access the Internet are applied automatically, relieving you of the need to enter rules manually every time a new application accesses the Internet or interacts with another program. This means that for most of the time, you won?t need to deal with questions relating to Internet access, minimizing interruptions and minimizing risk exposure due to insecure configurations. Outpost includes a wide range of predefined access policies; these settings can be customized to your individual requirements at any time.
* ImproveNet delivers more ready-made configurations
ImproveNet is a voluntary system of program configuration aggregation and distribution. After being reviewed and approved by Agnitum engineers, rulesets submitted by Outpost users are distributed across the user base, providing you with the most secure and up-to-date rules for a wide range of activities and applications.
* SmartAdvisor - instant, context-sensitive help
If ImproveNet doesn't have the answer, SmartAdvisor is always on hand to help you make the right decision when configuring access information for an application.
* Hands-free updates
Whenever an update to Outpost Firewall Pro is released during your license period, the update module automatically retrieves the latest version from the Agnitum server and applies it as soon as you authorize it to do so.
* Analysis of digital signatures
New! The new method of application identification reduces the number of dialog windows users get. Thanks to the implementation of vendors? digital certificates validation for Internet-active applications, qualifying programs are automatically assigned internet and local interaction permissions without asking a user. Digital certificates complement the existing practice of SHA-256 and MD5 checkups.