Fort Firewall functionality

Dashke

Level 1
Thread author
Feb 3, 2012
271
Since the existing thread with updates does not make all the functionality clear, I wanted to create a new one with some more information for the forum members and potential users.


Fort Firewall is a user-friendly yet advanced security tool for Windows 7 and above. It offers easy-to-use protection for beginners and customizable options for experienced users.


Fort Firewall employs its own kernel driver, which is based on the Windows Filtering Platform (WFP). WFP is a set of system services and APIs provided by Microsoft that allows developers to create network filtering applications for Windows. By using its own kernel driver based on WFP, Fort Firewall can efficiently and securely filter network traffic, ensuring high performance and reliability. This approach provides a solid foundation for Fort Firewall's advanced features and enables seamless integration with the Windows operating system.


It offers seamless Windows Explorer integration, making it even easier for users to manage and block applications. With this integration, users can simply right-click on a file in Windows Explorer and access Fort Firewall's options directly from the context menu. This allows users to quickly set up custom rules, block or unblock applications, and adjust settings without needing to open the main Fort Firewall interface.

Picture1



By monitoring inbound and outbound network traffic, Fort Firewall effectively filters IP addresses and application groups. It allows you to create rules to block or permit specific IP addresses and control app groups' access to the internet. Additionally, it supports wildcards in program path names, enabling flexible rule creation for various applications. This ensures a secure and customized browsing experience, tailored to your needs.

Picture2



As well as filtering IP addresses and controlling application groups' access to the web, Fort Firewall also allows you to apply speed limits to application groups. By setting custom bandwidth limits, you can manage and prioritize network usage for different applications, ensuring optimal performance and preventing network congestion.

Picture4



Fort Firewall offers a unique feature called "Zones" that allows you to block IP addresses more efficiently. Zones are user-defined groups of IP addresses or IP ranges with a shared set of rules. By organizing IP addresses into Zones, you can easily create and manage specific rules for blocking or allowing access to these groups. This simplifies the process of filtering out unwanted traffic and enhances the security of your browsing experience.

Picture5



At the user's request, Fort Firewall has a built-in function to store traffic statistics. This functionality enables users to keep track of their network activity, providing valuable insights into data usage, connection patterns, and potential security threats.

Picture6



By using SvcHost.exe service names, Fort Firewall effectively filters network traffic.

Picture3



Fort Firewall includes a simple graphical display of bandwidth usage, making it easy for users to visualize and understand their network activity. This visual representation showcases real-time data transfer rates, highlighting both incoming and outgoing traffic. With this intuitive feature, users can easily monitor their bandwidth usage, identify potential bottlenecks or congestions, and make informed decisions about managing their network connections for optimal performance.

Picture7



With the ability to add your own custom icons, Fort Firewall allows you to personalize the look and feel of your firewall.

image



If you would like to suggest something, feel free to report here!
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top