Листовка для McAfee Personal Firewall Plus v.6.0 EN MCF60U001RAA

Модели
MCF60U001RAA
Скачать
Страница из 2
a barrier against hacker break-ins
2005 version 6.0
Easy to install and use, McAfee® Personal Firewall Plus
continually safeguards your online communications - which is
equally critical for both high-speed and dial-up Internet
users. This essential protection works with DSL, cable
modem, satellite, dial-up and wireless connections, and is
easily configurable to protect single PCs or an entire home
network. Personal Firewall Plus protects against the
unauthorized access of your PC and personal data. Without a
firewall hackers can steal your private information, such as
credit card numbers, tax records, and passwords.
Safeguards your online financial transactions
When suspicious third parties attempt to connect to and
from your computer, McAfee Personal Firewall Plus blocks
Internet traffic that you do not want allowed. This provides
greater protection and confidence when you are using the
Internet to conduct confidential or private transactions.
Safeguards against masquerading applications that other
firewalls might miss.
Enhanced!
Intrusion detection system detects common
attacks, and logs them in an Internet Events section.
Improved!
Hacker tracing turns the tables on attackers and
aids in tracing them back to their source.
Improved!
Intelligent application handling automatically
denies outbound Internet access to malicious applications
that might secretly transmit personal data to hackers, while
allowing trusted programs to connect without unnecessary
alerts or false alarms. 
Exclusive!
Hackerwatch.org integration links to an anti-
hacking database and Worldwide Hacker Activity Map,
offering tips on responding to specific attacks, self-testing
tools and channels to e-mail online authorities of 
hacker events.
Protects your personal data from online intruders
McAfee Personal Firewall Plus guards your personal data
against hostile online intrusions, including denial-of-service
attacks and backdoor Trojans attempting to remotely seize
control of your PC. Activity logs are generated while these
types of attempts are made, providing the option to review
and report events to ISPs, law enforcement officials and 
anti-hacker authorities.
Like caller ID for your Internet connection, quickly gain information 
that can be used to report hackers to their ISPs and other security
monitoring authorities.
View active application connections and a traffic monitor that displays
active application usage across your Internet connection.