• The most reliable firewall. What is the best firewall for Windows

    A firewall is one of the most important lines of defense when working on the Internet and local networks. CHIP will talk about the main functions of such protection and offer free and commercial packages.

    Typical scheme for using a firewall in home network from various devices with Internet connection One of the most critical computer protection tools is a firewall, also called a firewall. It is a kind of gatekeeper that exercises strict control over incoming and outgoing data packets and has a set of rules for allowing programs and services into and out of the network. Surprisingly, firewalls are still not installed or configured properly on many computers. Meanwhile, a user whose PC is connected to the Internet and is not protected by a firewall puts both the performance of his machine and the safety of information at great risk. It’s even worse when the installed tool is configured incorrectly or several firewalls are active on the PC at the same time, as a result of which problems can arise. simple mistakes in the operation of programs and the establishment of connections, as well as critical errors in the operation of the OS. Some users have a bad attitude towards firewalls for the sole reason that when learning mode is turned on, initial stages work, these protections issue many requests to allow traffic from applications attempting to transmit or receive data from the Network. If you refuse such a request from a program, it will subsequently simply not connect to the Internet. On the other hand, allowing an unfamiliar utility to connect means exposing your PC to the risk of infection or data leakage. Even with minimal knowledge of setting up a firewall, such problems can be solved in a few seconds. However, the myth about the difficulty of debugging a firewall still persists. CHIP will talk about the basic principles of operation and configuration of firewalls and introduce the most popular software packages.

    How firewalls work

    The English name “firewall” and the German name “Brandmauer” hide the essence of the action of firewalls. Literally translated, they consist of two words: “wall” and “fire.” Initially, the term was used by firefighters to refer to special structures that can be used to protect adjacent buildings from the spread of fire. If we imagine that different network attacks- this is a fire, and the PC and home or office network are our home, then the purpose of such programs becomes obvious. In the case of a computer, the firewall takes on the role of a border checkpoint that allows network traffic and, in accordance with the list of rules, discards information prohibited from passing through, and also, depending on the settings, logs attempts at attacks from outside and unauthorized access to the Network. In this case, the user can set the rules for the operation of his “border point”. When creating such rules, depending on the firewall used, parameters such as protocol, address, port number, program name, rule operating time, actions in case of an attempt to establish a connection, and many other settings can be specified.

    What are they like?

    Modern firewalls can be divided into several types, each of which has pros and cons.

    SOFTWARE- special applications that perform the role of a firewall and, as a rule, related security functions. Such tools are relatively easy to install and configure, but they are subject to virus attacks. For example, if the system, antivirus and its databases are rarely updated, software firewalls may be disabled or partially damaged malicious utilities. Sorry, back to work software you have to pay for the CPU load and RAM, which can be very noticeable on a low-power computer.

    HARDWARE- professional, rather difficult to configure and expensive devices that relieve the PC load and are almost resistant to virus attacks. In addition, the operation of hardware firewalls can be invisible to the user and software, and their performance is much higher. Such devices are typically designed to filter traffic and protect the entire network, rather than individual PCs. They allow you to scan traffic for malicious and prohibited content and can be equipped with security add-ons.

    HYBRID are firewalls built into various software and hardware products. They are used as an addition to antiviruses, proxy servers, modems, routers, access points, etc. Typically, such hardware allows you to make the most necessary settings and create several traffic filtering rules, which, however, may be quite sufficient for a home network .

    Windows Firewall: entry level Website: microsoft.ru; Price: free This firewall supports the simultaneous operation of several network profiles: domain - domain network in the organization; public - public (public and wireless) networks; home - home or work closed networks. Thus, the appropriate level of security is ensured for each case - for example, internal and virtual networks and Internet access. In "seven", the firewall user interface in the Control Panel has become more informative. For everyone active profile are displayed additional information about the current settings. Two links have appeared on the left side of the Firewall Control Panel where you can change the settings for notifications about program blocking and enable or disable the firewall. Conveniently, for each profile, the function of blocking all incoming connections is available. In addition, you can add a program to firewall exceptions - this function is displayed on the left side of the dialog box. If you need to configure permissions for a specific utility, click on the “Allow a program or component to run...” link. To add an application to the list, you must click on “Allow another program”.

    Outpost firewall PRO: comprehensive defense

    Website: agnitum.ru; Price: from 899 rub.

    This product stands out for its well-thought-out interface with full support for the Russian language and an extensive set of protection tools when working in networks. At the same time, due to the large number of parameters, it will be more difficult for beginners to master it. It is possible to connect additional modules and fine-tune the program itself, as well as access to the Application Network: add and remove main programs, install general rules and change utility policies. The package is designed in such a way that all basic firewall operations, such as ad blocking, content filtering, email filtering, and an attack detector, are assigned to plugins. The main module monitors network activity and the behavior of applications available in the system, and configures all its components. The program can run in automatic mode or training mode. This is convenient when catching Trojans and spies. The package also includes a plugin for blocking online advertising. In this case, the program uses the “invisibility” mode by default, which makes it difficult to detect the user’s PC. and attacks on him. The utility is also equipped with a self-defense mechanism: when the outpost.exe process is deleted, communication with the Network is blocked.

    Comodo firewall: friendly guardianship

    Website: personalfirewall.comodo.com; Price: for free
    Perhaps the most friendly and simple utility, which at the same time offers ample opportunities and flexibility in configuration. In addition to the basic functions, this firewall allows you to view running processes, is equipped with a proactive protection module and can run applications in sandbox mode. For example, programs that are not recognized as trusted will only automatically run in isolation. Comodo also offers a convenient system of access rules for Internet applications and flexible control over the activities of software components. The program is automatically configured to work with DLL libraries, which are often used by keyloggers, Trojans and spyware to inject themselves into trusted processes. Application Behavior Analyzer monitors applications for modifications by third-party processes and other suspicious activity. Comodo Firewall constantly monitors its configuration files and blocks changes. However, password protection of settings is not provided. At times of peak activity, Comodo places a heavy load on the system. It is also too straightforward: for example, after blocking an allowed application under the guise of which a Trojan wanted to sneak in, you can use the program again only after a reboot.

    Kerio WinRoute Firewall: professional, expensive

    Website: winroute.ru; Price: OK. 10,000 rub. (for 5 PCs)
    This package is actually not so much a firewall as it is a combination of this tool and a proxy server. With such focus and functionality, this program is not necessary for every home or even office network, and even more so, it is not very profitable to use this tool to protect and control the traffic of only one PC. It will be difficult for an untrained user to immediately understand the settings of this complex, but by spending some time studying the utility, you will be able to greatly strengthen the security and control of the entire network. Kerio WinRoute Firewall allows you to connect anti-virus modules to scan all passed information; configure Internet access rights for different users and PCs (including by time and traffic consumption); adjust the Internet connection speed for each group or user separately; view logs with the history of visits by users of the controlled local network to various resources.

    The program requires a fairly significant amount of resources to operate, especially when used on a large, busy network. It is best to allocate a separate PC for Kerio WinRoute Firewall and create a so-called gateway.

    Kaspersky Internet Security: all included

    Website: kaspersky.ru; Price: 1600 rub.

    This is a comprehensive antivirus package that includes a very powerful and functional firewall. Immediately after installation, it is ready to work and does not require special settings or training. The developers took care of the user’s nerves and drew up rules in advance for working on the Network with standard Windows services and typical applications. Also, by default, the application already keeps all critical ports closed, through which attacks from the Internet are possible. When they are detected, the module blocks the attacking host for specified time, which can be customized. There is also a training mode in which you can describe in detail the allowed network activity of each program. If careful configuration is not required, there is a built-in set of standard rules that can be edited. Professionals will appreciate the selective blocking of Java applets, Java and VBS scripts, and ActiveX elements, the vulnerabilities of which are often exploited by attackers. When launching applications, the anti-virus package automatically checks their integrity and blocks them if modifications are detected. For not experienced users KIS has visual indicators that display open ports, a graph of application network activity, and count traffic.

    Expert's word. Antivirus plus firewall

    Vartan Minasyan, Head of Product Development Group, Kaspersky Lab Without a firewall, the effectiveness of all other protection methods will certainly be reduced. A typical case when the use of a firewall is mandatory is when a PC is running on a public network, for example in a cafe. It is also extremely useful when used in large networks, as it allows you to filter out unnecessary data and requests and thus improve performance. Modern packages security uses a multi-layered approach to protecting user transactions and data. All components, such as firewall, antivirus, application control, exploit protection, banking protection, etc., constantly exchange information with each other about decisions made and processes occurring on the computer. Therefore, it is important to use an antivirus and firewall from the same manufacturer, since, working together, they will provide best level protection than components from different companies. Beginners can gain initial knowledge about the capabilities of a modern firewall (for example, part of Kaspersky Internet Security) in the “Support” section on the manufacturer’s website: support.kaspersky.ru/8051.

    How to check the firewall

    After installing and configuring the firewall, you should check its effectiveness. Otherwise, the activity of the firewall may be harmful rather than beneficial. The use of special sites can help in solving this problem - such as, for example, 2ip.ru/checkport, portscan.ru, pcflank.com/test.htm, tools-on.net/privacy.shtml?2. In addition, CHIP recommends using test programs (Leak test): AWFT, PCFlank Leak test, 2ip Firewall tester or other similar ones. You can also use vulnerability scanners such as XSpider, eEye Retina Network Security Scanner, Nmap, or run one of them on one of the computers on your network and scan the internal range of IP addresses of the local network you are protecting.

    Most users, when deciding on computer security, limit themselves to installing commercial or, believing that this is quite enough for “one hundred percent” protection. However, this is not entirely true.

    The Internet is full of dangers and in most cases it is through the network that people access their computers. malicious applications, and then, having nestled in, they themselves begin to transmit the personal data of an unsuspecting user to the network, or use the computer to distribute spam or as a proxy server.

    Therefore, it is so important that each computer also has a good firewall installed, or as they also say, a firewall. In this short review we bring to your attention seven best free firewalls: Ashampoo Firewall Free, PC Tools Firewall Plus, Emsisoft Online Armor Free, ZoneAlarm Free Firewall, Filseclab Personal Firewall Professional Edition, Outpost Firewall Free and Comodo Firewall. The choice is yours.

    Ashampoo Firewall Free

    First on our list is free product Ashampoo Firewall Free. Like most programs developed by the company, this firewall has a convenient and colorful interface with Russian language support and a built-in settings wizard.

    To use the program, you must go through a simple registration procedure on the manufacturer’s website. In this case, a free code will be sent to the user's mailbox, which can be used to register Ashampoo Firewall.

    Immediately after installation, the wizard will offer to configure the program by choosing one of two modes: “Simplified” and “Expert”. In most cases, it is recommended to use Expert mode.

    The program has five main modules or sections. In the “Rules” section you can configure connection parameters for programs that use the Internet. The “Statistics” and “Journal” modules are purely informational. Here you can view data about all connections and events.

    The “Configuration” module is intended for internal settings of the firewall itself. The “Utilities” section contains four additional tools, namely, a process manager, a utility for clearing Internet surfing history, and a pop-up blocker.

    Ashampoo Firewall Free works approximately as follows: when an application for which there are no established rules tries to establish a connection, the firewall notifies the user about this, offering to create a new rule for this program, that is, allow or block its access to the network.

    When this function is disabled (learning mode), the dialog will not be shown, and all applications for which no rules have been set will be blocked automatically. You can also use the “Block all” option. In this case, the firewall will block all connections without exception.

    PC Tools Firewall Plus

    Next, we recommend that you pay attention to an excellent firewall called PC Tools Firewall Plus. Simple, free, with Russian language support, this firewall is one of the most reliable and effective, according to numerous user reviews. PC Tools Firewall Plus protects the system from unauthorized data transmission by Trojans, keyloggers and other malicious programs, and also prevents them from penetrating the computer.

    It also supports flexible management of network traffic, creating your own rules, protecting settings with a password, and hiding the presence of a PC on the network. The program is easy to install and does not require registration and system reboot as is the case with Ashampoo Firewall.

    Connection parameters are configured in manual mode. It is advisable to do this immediately after installing the program, since by default PC Tools Firewall Plus marks some applications as unverified and therefore may partially block their operation. The firewall user interface has six to five main sections.

    The Applications module is designed to manage programs and create rules for them. You can create a list of tested ports and IP addresses in the “Profiles” section, and if you want to analyze network traffic, you can switch to the “Operation” section. IN general settings You can adjust the level of protection, set up filtering, full-screen mode, and also set a password to protect PC Tools Firewall Plus itself.

    Emsisoft Online Armor Free

    Third place on our list is taken by a free firewall from Emsisoft GmbH called Online Armor Free. The program has a fairly impressive set of protection tools against all kinds of online threats, as well as blocking malware that uses the Internet. Online Armor Free includes four main protection modules: firewall, web filter, proactive protection and anti-keylogger.

    The firewall and web filter provide reliable protection against information leakage from the user’s computer, and also prevent unauthorized access attempts to the system by malicious scripts.

    The proactive protection module allows you to control the behavior of programs and, if necessary, limit their activities.

    Online Armor Free automatically scans the system for potential dangerous applications and marks them accordingly. The firewall uses updated online databases to determine the security level of applications installed on the system.

    Online Armor Free has a fairly simple and convenient interface with support for the Russian language. The main menu is located on the left side of the working window, the program status and date are displayed on the right side last update bases, as well as latest news from the developer's website. Online Armor Free supports creating rules for programs, managing ports and devices, creating lists of ignored domains, controlling the startup of suspicious applications, as well as controlling permissions to change the HOSTS file.

    The firewall's capabilities also include protection against spam, keyloggers, cookie blocking, site classification, and protection against forced address changes. home page browsers Internet Explorer, Opera and Firefox. Additional features of the application include support for virtual desktops, subnet scanning, as well as disabling HIPS and setting a password on the GUI.

    ZoneAlarm Free Firewall

    If the lack of the Russian language does not bother you, you can pay attention to ZoneAlarm Free Firewall - a very unique firewall in terms of design, designed to protect PCs when working on global and local networks.

    The application has an easy interface with a minimum number of settings. Supports control of user programs (access list), Internet traffic tracking, checking email attachments, detailed logging, blocking pop-up windows and advertising banners.

    In addition, the program has a cookie control function, which allows you to limit the transfer of confidential information to the websites you view. The user can set the protection level independently. You can download the ZoneAlarm web installer completely free from the developer’s website.

    During the installation of the package, in addition to the firewall, a number of tools are also installed additional protection– Web Identity Protections (web lock), Identity Protections (personal identification) and Online Backup (backup). After installing the firewall, you need to restart your computer.

    Filseclab Personal Firewall Professional Edition

    Filseclab Personal Firewall Professional Edition is another free, convenient and very simple firewall. The program supports creating individual rules for programs using a step-by-step wizard, filtering network access, viewing connections in real time, keeping logs, and monitoring traffic. Filseclab Personal Firewall responds to attempts by “doubtful” or new applications to open a connection by displaying a pop-up window asking you to create a corresponding rule.

    The program uses three main security levels, each of which is marked with a corresponding color: green, yellow and red. In addition, for each level it is possible to create personal rules. Filseclab Personal Firewall has a fairly simple interface divided into seven sections.

    The “Status” section displays the volume of traffic and the number of transmitted packets; “Monitor” displays the listening ports and application connections.

    In the Rules section you can set rules for specific application or domain.

    The remaining sections are of an informative nature. There is no Russian language in Filseclab Personal.

    Outpost Firewall Free

    The next firewall, Outpost Firewall Free, is perhaps one of the simplest and least demanding firewall systems. In this respect, it is akin to the standard Windows firewall, which, as a rule, is constantly present in the system and does not show itself :).

    Outpost Firewall is a fairly easy-to-use program designed to protect against external intrusions, as well as unauthorized transfer of data by applications installed on the user’s computer. Unlike other firewalls, Outpost Firewall Free requires virtually no preliminary configuration.

    The application supports monitoring of all incoming and outgoing connections, tracking software activity in real time, and extensibility using built-in modules. In the event of a threat or network activity of “dubious” programs, Outpost Firewall will notify the user about this and offer to allow or block the application that has declared itself.

    Outpost Firewall Free has a very simple user interface, not burdened with “extra” functions. Russian language, unfortunately, is missing.

    However, this is not so important - the program is simple enough that even a novice user can understand it. A few settings allow you to adjust the level of protection if necessary (up to completely blocking connections), as well as create exclusion rules for various programs and services.

    Comodo Firewall

    And finally, we invite you to briefly familiarize yourself with another free Comodo firewall Firewall. This powerful, feature-rich program with an impressive set of tools is initially bundled with Comodo Antivirus, Comodo Defense and the Dragon web browser, but can also be installed separately.

    The firewall provides complete protection against hacker attacks, Trojans, malicious scripts, keyloggers and other types of Internet threats. The application supports monitoring of incoming and outgoing traffic, working with ports, hiding a computer on the network, monitoring software and driver updates

    Additional firewall functions include maintaining a detailed event log, integration into Windows Security Center, fast switching between modes (from the system tray), protecting the system during startup, detecting unidentified files, viewing active processes and launching applications in a special sandbox (Sandbox).

    With such a solid set of tools, Comodo Firewall has a simple Russian-language interface aimed at a user inexperienced in network settings. All tools and functions of the application are distributed among four modules, and each option has a corresponding description.

    Plus, the program is equipped with a system of interactive dialogues (pop-up windows), written in an extremely simple and understandable language for a novice user.

    Bottom line

    Choosing a good firewall can seem like a daunting task. And to make this job easier, let me give you a few free advice. First, when choosing a firewall, pay attention to the opinions of experienced users and software testers. As a rule, a really good firewall leaves a lot of positive reviews.

    Secondly, a good firewall should not enter into unreasonable conflicts with system drivers, popular applications and antiviruses, as well as be able to work with Windows Security Center.

    The presence of updated databases is also very desirable. In addition, a good firewall cannot be easily disabled from the Task Manager (this can be done with Filseclab Personal Firewall).

    Thirdly, the firewall should not slow down the system in any way. For example, in this regard, the ZoneAlarm firewall seriously loses, since it is quite demanding system resources and can slow down the operation of a weak machine.

    Also, before making your final choice, it is advisable to test the firewall using a special program 2ip Firewall Tester. Everything else, such as the presence of the Russian language, the convenience of the interface, external decorations is secondary.


    Few people think about setting up a Firewall until they encounter problems with the security of their Windows 10 computer, laptop or tablet. You can be smart and download the best free Firewall for Windows 10 before problems arise and set everything up perfectly. In this article, we will tell you about the best firewalls, create a rating, and you can decide for yourself which option suits you best.

    What is Firewall

    Before we talk about the best firewalls, it would be useful to know what a firewall is. This word comes from the English – Firewall, and means protective screen your device. Firewall controls incoming and outgoing traffic, thereby preventing outside interference into your device and preventing the theft of personal data. Very often you can come across another name - Firewall, in this context we are talking about the same thing.

    Firewall rating for Windows 10

    The operating system initially has a built-in Firewall, which provides decent protection for the OS. However, fine tuning the built-in Firewall is no different, so you should choose a third-party solution. But before installing a third-party solution, you will probably need to disable the Windows 10 firewall. This is necessary just in case you want to install a firewall from a third-party developer. Otherwise, it is possible that the utilities will conflict with each other. Among the best firewalls for Windows 10, we would like to highlight the following: All of the firewalls listed are free and have earned the title of the best thanks to the experience of hundreds of users. Let's look at each option in more detail.

    Windows 10 Firewall Control

    Windows 10 Firewall Control is a small utility that allows you to fine-tune the built-in firewall. A convenient interface in Russian and truly comprehensive settings that are suitable even for system administrators - that’s what made Windows 10 Firewall Control the best firewall.

    Comodo Firewall

    Comodo Firewall - exists as an independent product, and is also part of the antivirus. Installs on any version of Windows 10 - 32 and 64 bit, and works completely unnoticed, without loading the system or slowing down the computer. If after setting up the firewall you start having performance problems, then the problem is different. Find out by following the link.

    Kaspersky Anti-Virus

    Many of you know it as a regular antivirus, even if it is part of . But it's not easy antivirus program, this is also a Firewall. Firewall is included in the majority modern versions Kaspersky, starting with the regular version and ending with the business version. This utility, unfortunately, slows down the system a little, but it reliably protects your device.

    Most others also include a firewall; you don’t have to limit yourself to the three options we’ve given in this article. But there are situations when it is necessary to disable the Firewall; you will learn more about this in the following video:

    Did you like the article? Share with your friends:
    • Useful programs for Windows 10

    Indeed, Windows comes with a built-in firewall, which is especially effective in latest versions Windows. However, users may choose an alternative solution, especially if it is free. The 2016 version of ZoneAlarm Free Firewall is not much different from its predecessor, but still receives several useful improvements.

    Persistent firewall

    The main program window has remained virtually unchanged. Three large panels represent antivirus, firewall and data protection. The antivirus panel is grayed out with a message that antivirus protection is available but not installed. It is assumed here that you will use ZoneAlarm in conjunction with your favorite antivirus solution, for example, Panda Free Antivirus (2016). If you don't already have antivirus protection, click the button to install it, after which the product will actually turn into ZoneAlarm Free Antivirus + Firewall 2016.

    When reviewing an older version of ZoneAlarm, it turned out that the installer required changing the search engine and home page in the browser. Certainly, these manipulations allowed the Check Point developers to earn some income. The 2016 version no longer enforces these changes and no longer includes the licensed toolbar, which many users found useful. In addition, the product has lost its protection against phishing, because it was a functional part of the toolbar, but, on the other hand, anti-phishing is not a typical component of firewalls.

    ZoneAlarm is one of the earliest personal firewalls on the market - the product has been evolving and improving over the years. The program does an excellent job of switching all system ports to hidden mode, making them invisible to external attacks. The Windows Firewall also copes effectively with this task, so unsuccessful attempts to hide ports third party solutions They look suspicious to say the least. Note that despite the fact that the firewall developers in Kaspersky Internet Security (2016) decided to abandon the port hiding function, the product is seriously focused on detecting and blocking network attacks.

    ZoneAlarm does not attempt to detect network attacks that attempt to exploit system vulnerabilities. This level usually not present in free solutions. In PCMag's amateur tests, the Kaspersky firewall detected the most exploits, and Symantec Norton Security identified and blocked absolutely all of them.

    ZoneAlarm software control configures network and Internet access permissions for all programs that attempt to connect. By default, the component scans programs at a medium sensitivity level, which offers the optimal balance between good protection and fewer pop-up alerts. The tool leverages Check Point's extensive DefenseNet database to automatically configure permissions for a wide range of known trusted programs.

    When testing at the medium level of protection, the self-written browser was detected, but when permission was automatically obtained, outgoing connections were allowed to it. When sensitivity was set to maximum, the component detected access attempts and asked the user whether to allow these actions. Considering the huge number famous programs, whose network access is automatically handled by a firewall, it is recommended to use maximum protection and pay attention to pop-up alerts.

    Of course, a firewall can only control network access attempts that it can detect. Leak testing programs mimic stealth network access techniques that are used by some malware to masquerade as secure applications. In the test, ZoneAlarm detected most of the leak tests and identified one of them as a malicious application.

    In terms of direct targeted attacks, ZoneAlarm was one of the first personal firewalls to successfully resist these types of threats. The tests failed to find a way to disable firewall protection. One method that often works is to disable startup of important firewall services. When trying to perform these manipulations, ZoneAlarm displayed the message “Access denied.” With Comodo Firewall 8 this method worked, but upon reboot the firewall detected a problem and offered to fix it.

    OSFirewall

    When the sensitivity of the software control was set to maximum protection, it was noticed that in addition to alerts about network access attempts, the firewall also displayed pop-up notifications about suspicious behavior. This functionality is provided by the behavioral component OSFirewall.

    In medium sensitivity mode, when installing 20 old PCMag utilities, no alerts appeared. After the protection level was raised to maximum, each utility generated at least one pop-up alert, most of which were displayed during the installation of the test sample. When creating and running a temporary copy of the installer, the firewall reported such a suspicious action as an attempt to access with administrator privileges. Many utilities have raised a warning that an application is trying to communicate with Windows Explorer by opening its process.

    Naturally, if you select blocking for any manipulation data, the installation will not work or the program will not work correctly. The maximum level of protection is still recommended, but when installing new programs it is advisable to lower the sensitivity to medium. It's worth noting that Comodo's behavioral analysis feature also found more alerts -, in in some cases, more than a dozen per utility.

    Cloud backup storage

    Along with the installation of ZoneAlarm, the user is offered to receive 5 gigabytes of cloud storage for free from ZoneAlarm's partner - IDrive. The premium version costs $59.50 per year and offers 1 terabyte of cloud storage. IDrive received the title of “Editor's Choice” in the category of services cloud storage data.

    When the user initially clicks the link to activate cloud storage, a page opens that explains the capabilities of the service and allows you to install separate application for data backup. As mentioned, you can get 5 gigabytes for free, and you will receive a similar offer directly from IDrive. If 5 GB is not enough for your needs, you can upgrade to the Premium plan for 1 terabyte cloud space. Panda Internet Security 2016 only offers two gigabytes of Mozy-based backup storage, but the user can get a 15 percent discount on other paid Mozy plans. A ZoneAlarm representative said that they also offer discounts in the form of promotions.

    To activate the backup system you need to create account. Enter your name, email and password and you can proceed to the next step. You then need to tell IDrive whether to use a standard encryption key or a custom key. When choosing the second option, you will have to remember given key, otherwise you will not be able to access your data. On the positive side, even with an official request from government agencies, IDrive will not be able to decrypt your files.

    The backup utility doesn't waste your time. Immediately after installation is complete, backup of important folders begins: desktop, Music, Pictures and Documents. You can easily add your own folders and files to copy.

    The backup tool allows you to save a copy of your files locally or on a server. You can also create an image backup of the entire drive, although it likely won't fit within the available 5 gigabytes. From any computer connected to the Internet, you can log into your account and manage your backup files. The service even includes a viewer graphic files. Moreover, the tool has support for mobile devices and social data backup, among many other features.

    Data protection

    The Identity Protection component of ZoneAlarm consists of two parts. First, Identity Protection performs credit monitoring and notifies you of any changes to your credit history. In addition, the Identity Lock feature prevents unauthorized transfer of user data from the system.

    The monitoring service is provided by ZoneAlarm's partner - Identity Guard. Specifically, you get one year of what's called Good Start protection. After entering personal data, the service will check your credit data every day and notify you by email about any changes to the credit file. If you have questions about the service or are confused by any notification, unlimited free technical support. Although the service is free, the user will need to enter credit card information as part of the verification process.

    By default, Identity Lock is disabled because it cannot work when there is no personal data. When entering data, the user can choose from 10 different categories, including phone numbers, credit cards and addresses. For each object, you can specify a descriptive name and the data that needs to be protected. By default, ZoneAlarm uses one-way encryption to save data. Thus, if an attacker gains access to the program, he will not be able to read your private data.

    With a medium level of protection, ZoneAlarm notifies you of any attempt to transmit protected data via email and browser. If you select the cancel transfer option, your data will be replaced with asterisks. At the maximum level of protection, data is replaced with asterisks automatically, without unnecessary requests. Please note that Identity Lock does not work with HTTPS-secured connections.

    Free but proud

    In modern realities, the market for autonomous personal firewalls is, frankly speaking, small. The increased efficiency of the built-in Windows firewall predetermined the choice of the majority. Paid solution It will be very difficult here.

    ZoneAlarm Free Firewall 2016 and Comodo Firewall 8 are both Editors' Choice for Windows firewalls. Comodo includes a rich set useful functions, including at times problematic behavioral blocking. ZoneAlarm contains all the necessary firewall features and includes its own bonuses. If you want to refuse system solution In favor of a third-party personal firewall, it’s worth trying this product.

    ZoneAlarm Free Firewall 2016 review:

    Advantages

    • successfully hides all system ports;
    • manages program access to the Internet and network;
    • no longer forcibly installs the toolbar or changes the home page settings;
    • effectively resists attacks;
    • includes protection of personal data, backup to cloud storage.

    Flaws

    • no longer includes phishing protection;
    • at maximum sensitivity, behavioral detection produces large number false positives.

    Overall rating

    ZoneAlarm Free Firewall 2016 performs all traditional firewall tasks and no longer comes with a toolbar. Cloud backup and credit status monitoring make this free product an even more interesting choice.

    I ran into a serious problem. Young Windows was good, but it had a huge number of dangerous vulnerabilities that made it easy for hackers to penetrate the system. The only way out of the situation was the development of a separate software, which would monitor network activity and stop unwanted traffic.

    Microsoft developed its own firewall and integrated it into Windows. Today we know this application as Windows Firewall. Unfortunately, the built-in firewall turned out to be not very reliable. To ensure network security, your computer still needs third party applications. Here are the best free firewalls that will give you that security.

    ZoneAlarm Free Firewall

    ZoneAlarm Free Firewall - one of the oldest and most famous firewalls. Its first version was released back in 2000, and the most recent - in January 2017. The firewall can hide open ports, detect suspicious traffic and disable malware. ZoneAlarm Free Firewall also regularly communicates with the DefenseNet server, from where it obtains information about the most current threats. The firewall can protect the user’s PC when working through public Wi-Fi points. The only disadvantage of ZoneAlarm Free Firewall is that it may conflict with other programs that provide network security.

    Comodo Firewall


    If you don't like firewalls that bother you with too frequent notifications, you should pay attention to Comodo Firewall . This program is quite “silent” and does not bother the user over trifles. Meanwhile, Comodo Firewall is quite reliable. The firewall monitors your network and compares system and application data with a huge list of dangerous files. On at the moment this list contains information about more than 2 million threats. It is replenished daily.

    PeerBlock


    While many firewalls attempt to provide comprehensive protection, PeerBlock serves only one purpose. This firewall blocks access to your computer from known dangerous addresses. This is an excellent choice if you want to protect your privacy from ad networks, tracking software, government or private anti-piracy organizations, and other Internet nasties. PeerBlock automatically updates the list of potentially dangerous addresses, but you can also change it manually.

    TinyWall


    TinyWall - a lightweight and silent firewall that does not irritate the user with pop-ups and notifications. Essentially, TinyWall can be considered a plugin that improves the performance of the built-in Windows firewall. The program is perfect for beginners, since it does not have any complicated settings.

    OpenDNS


    OpenDNS is not a downloadable firewall, but an Internet service that provides publicly accessible and secure DNS servers to everyone. You just need to specify the correct data in your router settings so that all your traffic goes through these servers. This is very convenient for users whose home network has many Internet-connected devices, especially smart home gadgets.

    Anti NetCut3


    If you often need to use public Wi-Fi, firewall Anti NetCut3 can help you protect your system when connecting to a compromised point. This program is designed for the sole purpose of monitoring a specific network connection. All you have to do is specify which adapter to monitor. It could be Wi-Fi adapter, if you connect over the air, or a network card if you access the Internet via cable.