Download Jetico Personal Firewall v2.0.1.4 keygen by YAG

Added to site2008-02-06
Rating93/100
Votes9


Jetico.Personal.Firewall.v2.0.keygen.zip (163117 bytes)

namesizecompressed
FILE_ID.DIZ 51 51
Jetico.Personal.Firewall.v2.0.keygen.exe 182272 161619
YAG.nfo 2032 979

FILE_ID.DIZ

keygen for Jetico Personal Firewall v2.0.1.4 by YAG


YAG.nfo

TEAM YAG presents:
                      Jetico Personal Firewall v2.0.1.4


Release-Date: 2008-02-06
Program Typ : firewall
URL         : http://www.jetico.com


Release-Notes:
==============


Jetico Personal Firewall software protects computer against hackers and malicious
software when networked or connected to the Internet. It offers detailed, configurable
event logs, reports, plus the option to view and edit the firewall configuration.
The modular architecture is as open as possible to assist with easier evaluation of the
security.

With Jetico Personal Firewall you can:

*Monitor running applications that access the network.
*Monitor selected/all network packets as well as selected network events.
*Choose a pre-defined Security Policy รน the firewall rule set.
*Modify Security Policy to meet your needs.
*Make your own Security Policy.

Three-layers protection:

1. Low-level. (Network packet filter). This checks the validity of network packets and
   parameters such as source & destination addresses, protocol, etc. Using this process,
   Jetico Personal Firewall can make your computer invisible to a non-trusted network.
   By selecting the Optimal Protection Policy, your computer becomes "stealthy". Any
   security probing tests (for example, ShieldsUp! tests) by internet hackers will report
   that your computer does not exist.

2. Application-level. (Network events filter). This checks and enables you to monitor
   network/internet connection requests made by applications. If you are not sure why an
   application wishes to send or receive data from the Internet you can limit or block
   the activity.

3. User-level. (Process activity filter). This notifies you of and prevents dirty tricks
   by Trojans and other malicious programs. A Trojan can inject its own code into
   programmes on your computer and send data about you to a third party. e.g. a Trojan
   in Internet Explorer could transmit details of your browsing preferences.


Install-Notes:
==============

install and check crack dir


# 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z