The Online Armor product was designed to be a revolutionary software that will protect your system against Spyware, Malware, Trojans and Phishing attacks. Instead of using patterns to identify programs (letting unknown threats run silently in the background) Online Armor uses a unique combination of behaviour analysis and white list of safe programs.
When Online Armor detects a new program or potentially unwanted behaviour, the user is immediately alerted and can prevent the program running. The extensive white list prevents unnecessary pop-ups, making Online Armor quick, simple and unobtrusive.
ATGuard 3.22 A great program for protecting your computer from hacker attacks and trojan horses. Plus many other useful features, including blocking of banners etc » 15.02.2001 - 1,5 MB - 98/ME/2K - Free
pcInternet Patrol 3.2.4 pcInternet Patrol is the first firewall to use a web-based white-list of authenticated executables. Its immense database allows the user to verify the authenticity and safety of any executable file automatically and in real-time » 20.04.2005 - 86 KB - 98/ME/XP - Shareware, $79.95
PortsLock 1.9 PortsLock is a filtering firewall for Windows NT/2000/XP and Windows 2003 Server that fully supports user-level security » 13.05.2006 - 1.61 MB - XP/2K3 - Trial, $
eTrust Personal Firewall 5.5.114 eTrust Personal Firewall will provide complete, industrial-strength hacker and privacy protection, with an easy-to-use interface and pre-loaded settings that take the guesswork out of security » 11.08.2006 - 8.92 MB - 98/ME/2K/XP - Trial, $29.99
Core Force 0.95.167 Core Force is the first community oriented security solution for personal computers. It is free and provides a comprehensive endpoint security solution for Windows 2000 and Windows XP systems » 21.01.2007 - 19.5 MB - 2K/XP - Free
Ashampoo Firewall 1.20 You probably know that you need a firewall program to use the Internet safely. In addition to protecting you against attacks from the Internet, a good firewall will also tell you when programs installed on your computer are trying to phone home and enable you to prevent them from doing it » 10.04.2007 - 4.08 MB - 98/ME/2K/XP - Free
BlackICE PC Protection 3.6 crq BlackICE teams a personal firewall with an advanced intrusion detection system to constantly watch your Internet connection for suspicious behavior » 17.08.2008 - 6.75 MB - 98/ME/2K/XP - Trial, $39.95
Windows Firewall Control 184.108.40.206 Windows Firewall Control is a small and easy to use application that runs in your system tray and provides quick access to the most frequent options used from Windows Firewall. » 01.08.2018 - 3.29 MB - Windows 7/8/10 - Free
Avast Internet Security 18.2.3827.0 avast! provides a package of applications that aim to protect your computer from a possible virus infection or other malware threat » 01.03.2018 - 218.99 MB - Windows 7/8/10 - Trial, $
Outpost Firewall Pro 9.3 (4934.708.2079) Automatic, intelligent protection against hackers and trojans as well as against other threats and nuisances such as all sorts of pop-ups and adverts » 01.12.2015 - 42.72 MB - Windows XP/7/8/10 - Trial, $
Privatefirewall 220.127.116.11 Privatefirewall is a personal firewall and intrusion detection application that protects your computer from hackers and Trojan horses » 20.12.2013 - 3.58 MB - Windows XP/Vista/7 - Free
Sandboxie runs your programs in an isolated space which prevents them from making permanent changes to other programs and data in your computer.
The red arrows indicate changes flowing from a running program into your computer. The box labeled Hard disk (no sandbox) shows changes by a program running normally. The box labeled Hard disk (with sandbox) shows changes by a program running under Sandboxie. The animation illustrates that Sandboxie is able to intercept the changes and isolate them within a sandbox, depicted as a yellow rectangle. It also illustrates that grouping the changes together makes it easy to delete all of them at once.
A network security scanner that explores the remote computer and displays the following information: Domain and NetBios names, MAC address, Server information, Domain and Domain controller information, Remote control, Time, Discs, Transports, Users, Global and local users groups, Policy settings, Shared resources, Sessions, Open files, Services, Registry and Event log information.