Di seguito sono consultabili le note di rilascio - in gergo "release notes" - relative al file Jetico Personal Firewall 2.0.0.24 beta, nel caso in cui gli sviluppatori abbiano reso disponibile tale documentazione in occasione della pubblicazione del software. Tuttavia, se hai bisogno di maggiori informazioni su Jetico Personal Firewall 2.0.0.24 beta, o se le note di rilascio non sono (ancora) disponibili, è comunque possibile procedere con la lettura della descrizione del file. |
System-related changes
- Jetico Personal Firewall v2 runs as privileged Windows service. It can
protect computer before user logon.
- Native support for Windows XP Fast User Switching and Terminal Services.
- Jetico Personal Firewall supports Access Control Lists for all main functions.
Administrator can configure ACL to grant access to particular firewall functions for
any user or group.
- Windows XP Service Pack 2 Security Center support.
User interface changes
- Improved rule editing interface.
- New popup message. The new look for popup dialog is presented. Popup message
text and rule creation options can be modified.
- Firewall variables formerly controlled by Configuration Wizard, are integrated
into main application window.
- Language file support for easy localization. All translatable words and phrases
are taken from single UTF-8 encoded text file.
Configuration changes
- New XML-based open configuration file format. Detailed documentation is
available upon request.
- The new version maintains single protected firewall configuration for all users.
- Simplified controls for configuration.
- New hash handling scheme. Separate table for hash checking.
- Each firewall filtering layer has own root table.
- New automatic variables (per-connection) for local connections are supported.
Changes in firewall rules
- Rules support lists of parameters where possible.
- IP rules support IP address ranges.
- Low level protocol rules support filtering by MAC address.
- Application rules have events for direct and indirect access to network.
Indirect access details are also available.
- New module for hash checking created.
- Application, Process attack and Hash checking rules support wildcards in file paths.
Logging subsystem changes
- Log entries can be associated with rule.
- Firewall can create rule based on log information.
- New WELF-compatible text log format. WELF is supported by many log analyzers.
- Improved log control.
|
|