![]() As a result, IE fell behind the bad guys so badly that it became a porous, primary target of attack. Namely - remember what happened when M$'s Internet Explorer succeeded in killing off all other browsers except for poor little Opera & splinter-browser K-meleon? What happened was this - after the competition was gone, M$ pretty much CEASED spending $$ on tweaking Internet Explorer. Instead, I think that history will repeat itself. If the M$ FW eventually has zero competition, will M$ continue to work hard & spend $$ on improving its FW? I doubt it. Me, I still prefer to avoid any security product that is produced by the same company that left security holes in its OS for hackers to penetrate.Ĭonsider this: It appears that stand-alone (3rd party) firewalls are a dying breed. This FW forum has become rather boring if one isn't interest in front-ends instead of stand-alones. It's too bad that the Windows internal FW is so popular. If I ever get paranoid enough to want a full-on contemporary FW/HIPS, I'll give SpyShelter & Comodo each a trial. And I love the little cop in my system tray. Its System Anomaly capability monitors each process as to its "normal" usage of each CPU core, & pops an alert whenever the cpu usage by any process goes outside of user-specified boundaries. Its application whitelisting works just fine. It's HIPS is still reasonably effective (& certainly better than no HIPS at all). For shame!Īs for a software FW, I'm still partial to Private FW. ![]() includes our unique DeployHelper technology which helps to install software straight into isolated environment.Ĭlick to expand.My main firewall is in my modem. includes initial database of rules which includes more than 400 applications, the database is regulary updated is completely autonomous and doesn't require Internet access protects from zero-day attacks, exploits and malware including previously unknown threats supports 32-bit and 64-bit Windows versions is compatible with all current Windows versions from Windows Vista SP1 to Windows 10 and doesn't require frequent updates is based on well documented certified safe and secure Windows built-in security subsystems, hence ReHIPS provides unprecedented protection, ensures system stability and integrity and doesn't increase attack surface But this is also in ReHIPS Corporate Edition, custom builds for your ultimate and precise protection, so if you plan to use ReHIPS at home, you probably won't need it. They're implemented as plugins and provide additional protection like control over common startup points or reaction to uncommon events like strange new users being added. ![]() This is utilized in ReHIPS Corporate Edition, so if you plan to use ReHIPS at home, you probably won't need it.ĥ. It's possible to create and customize a pack of rules exactly to fit your needs and manage computers remotely or groups of computers via Active Directory. This one is quite simple and straight-forward, but some people really like it.Ĥ. Some AntiSpy stuff like disabling camera and microphone. Isolated processes can have their own desktop, access to network and other system resources including file system objects and registry can be filtered.ģ. Any untrusted process can be executed in a sandbox (executed from a separate restricted ReHIPS-user), so it won't affect the system or other processes (non-isolated or isolated in other isolated environments). This provides fine-grained control over all starting and running processes.Ģ. When a process is started, inspection takes place, whether parent process is allowed to start processes, whether process being started is allowed to start, file hashes and digital signatures are checked, command lines can be inspected, etc. Basically ReHIPS provides the following:ġ. Let's take a brief overview of ReHIPS features and find out what it can do. ![]() Sometimes new potential users come and ask "what is ReHIPS? what can it do?". ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |