TITLE

SHUT OUT HACKERS

AUTHOR(S)
Spanbauer, Scott
PUB. DATE
July 2002
SOURCE
PCWorld;Jul2002, Vol. 20 Issue 7, p96
SOURCE TYPE
Periodical
DOC. TYPE
Product Review
ABSTRACT
Reviews six software firewalls for computer security and protection against hacker intrusions. Features and prices of ISS BlackICE PC Protection 3.5, Microsoft Windows XP Internet Connection Firewall, Network Associates McAfee Firewall 3.02, Sygate Personal Firewall Pro 5, Symantec Norton Personal Firewall 2002, Zero-Knowledge Systems Freedom Personal Firewall 3.2, and Zone Labs ZoneAlarm Pro 3; Recommendation for Sygate Personal and Zone Labs.
ACCESSION #
6801992

 

Related Articles

  • McAfee Launches Next Generation of Firewall Products.  // Channel Insider;6/10/2009, p1 

    The article reviews the firewall software products McAfee Firewall Enterprise, McAfee Firewall Enterprise Control Center and McAfee Firewall Enterprise Profiler from McAfee Inc.

  • Creating a safety zone for home nets. Avery, Mike // Network World;4/8/2002, Vol. 19 Issue 14, p27 

    Features the Zone Alarm Pro security product from Zone Labs to protect stacked up against corporate firewalls. Enhancement features tested via the Web site download; Discussion on the defaulted program to moderate level of security; Variety of connections through connecting laptop to corporate...

  • CBTekChat.  // Caribbean Business;6/12/2008, Vol. 36 Issue 23, p58 

    The article provides an answer to a question regarding the protection or a software-based firewall needed to prevent viruses in the computer.

  • A Suite Deal? Luhn, Robert // PCWorld;Jul2002, Vol. 20 Issue 7, p104 

    Examines two computer software suites which include an antivirus scanner and a firewall. Symantec's Norton Internet Security 2002; Network Associate's McAfee Internet Security 4.02; Features; Prices; Recommendation that one build one's own suite of applications for computer security.

  • The cache catcher. Langley, Nick // Computer Weekly;11/21/2002, p74 

    Provides information on the computer software proxy server that are a combination of an Internet cache and a firewall. Origin of proxy server; Purpose of the server; Difficulty in configuring proxy server.

  • Stop the hack attack.  // Australian Personal Computer;Jul2002, Issue 283, p142 

    Examines the importance of computer firewall for the protection of computer programs against hackers. Basics of using Terminal and command line; Accessibility of IP and user address; Availability of commercial firewall products on the market.

  • LapLink Gold Version 11.0. Strom, David // Network World;1/21/2002, Vol. 19 Issue 3, p54 

    Presents LapLink Gold Version 11.0 from LapLink. Ability of Laplink for remote control sessions to transit corporate firewalls and machine control across the Internet; Conditions on the using the LapLink; Difficulties on installing the LapLink.

  • TOP TIP. Harris, Link // Australian PC User;Jun2004, Vol. 16 Issue 6, p80 

    Provides tips on installing the ShieldsUP! firewall through Internet Explorer.

  • Sophos Endpoint Security. Liston, Tom // Information Security;Oct2006, Vol. 9 Issue 10, p55 

    The article reviews the Sophos Endpoint Security antimalware/client firewall software from Sophos.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics