Quick, let's block 20% of the internet!! There, now don't you feel more secure :). The program would be greatly improved with the addition of either a right-click context option to allow the page you're trying to load, or a button on the interface to "allow last blocked".īut that's the only bad thing I'll say about it. (you can try right-clicking on the adress as it flys by on the interface screen, but it's nearly impossible to catch them) You can allow it for 15 mins., an hour, or permanently. When it blocks something legit, you have to open it up, click "history", "blocked", and find the address you want to allow. Other times, the site loads fine, and you'll see that PG2 just blocked a tracking probe that loaded w/the page. It will do this often, sometimes preventing you from loading the site you wish to visit. You can set the tray icon to blink on probes (HTTP recommended, not TCP/UDP or it'll be blinking constantly). Without this program your computer is wide open.Ĭons: It can be a pain in the ***** to deal with at times. As of right now, my PG2 is blocking nearly 3 billion addresses. In addition, you should try Blocklist Manager, for even more IP's that can be set to export to apps like PeerGuardian and ProtoWall, increasing their capability even further. PG2 imports list of IP ranges to block from the sourceforge website. Microsoft, something called the "asian data collection center", lol, is a constant HTTP threat, probing my computer at least 100 times a day! of Labor as well as various other American, Chinese, Korean and South American governmental agencies. Even when I'm not running Limewire or Azureus, PG2 routinely blocks attempted HTTP probes by the likes of the Dept. Data privacy and integrity regulations and required security audits mandated by governmental and professional authorities, along with infections and damage caused by guest PC access, have also prompted use of such security software.Ĭompetitors include Symantec/Sygate, Cisco Security Agent, McAfee Entercept, and even point products like Determina's Memory Firewall.Pros: I strongly disagree with anyone who says this program isn't worth it's salt if you don't use P2P apps. A number of destructive worms that followed, and the subsequent rise of spyware as a significant problem, continued to increase demand for endpoint security products. Integrity was integrated with network gateways (the Cisco VPN 3000 series) to ensure that a PC met security requirements before it was granted access to the network.ĭemand for endpoint security grew in 2003 after the SQL Slammer and Blaster computer worms reportedly caused extensive damage, despite widespread use of antivirus software on personal computers. The Integrity software, released in early 2002, was derived from the ZoneAlarm security technology and added central policy management and network access control functions.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |