
Personal Firewall
With adjustable security levels, a trusted site list, and a port blocking function, the Personal Firewall gives you the control to keep your computer safe from malicious code like spyware and Trojan horses. The Personal Firewall is comprised of the following components:
Cloaking: Prevents your computer from being found. Cloaking hides the entry points (ports) of your computer making it appear to be disconnected from a network. Hackers using techniques like NetBIOS browsing, port scanning, or ICMP packet special processing will be unable to locate your computer.
Firewall: Provides a barrier between your computer and the network (LAN, Internet). This barrier examines and filters network traffic coming into your computer. By filtering network traffic, the firewall prevents malicious programs or files from entering your computer. The firewall protects against attacks hackers commonly use including: Ping of Death, IP conflict, SYN flooding, and others.
Trojan Backdoor Blocking: If a hacker has already broken into your system, he or she could have installed a Trojan (small hidden program) onto your computer (unlike viruses, Trojans do not replicate themselves, but can still wreak havoc on your system). To avoid being traced, the hacker can then use your computer to attack other computers. The Trojan Backdoor Blocking function prevents hackers from using your computer by blocking Back Orifice, Back Orifice 2000, Net Bus, Deep Throat and other known back door programs.
There may be Web sites that you know are safe and will not attack your computer. Using the Trusted Sites function, the Personal Firewall lets you add these safe sites to a list. Your computer can connect to any Web site on this list because they will not be filtered.
Malicious code and other threats hidden inside files, email, or on the Web can enter your Palm, Pocket PC, or EPOC device during beaming, synchronization, or Internet access. Trend Micro
Software Utilities
59