Categories
Security

Look n Stop Firewall Firewall Security for Windows

Look ‘n’ Stop Firewall – secured protection against Internet hacker attacks
Look ‘n’ Stop was designed to provide a permanent and highly secured protection against Internet hacker attacks.

Look ‘n’ Stop Firewall protects you against the “trojan horse” that trys to transmit your personal data to the outside without your agreement. Your permanent Internet connection can be scanned permanently from the outside.

Here are some key features of “Look n Stop Firewall”:

· Blocks spywares and keystroke loggers.
· Makes your PC invisible to hackers.
· Fast download and fast setup.
· Out of the box configuration.
· Tracks the attacks attempts through logged events.
· Includes a password protection of the configuration.
· Very efficient and highly configurable for advanced users
· Features extension through plugins.
· Automatically updates new releases.

Additional configuration options:

‘Anti-Flood’ options is useful to limit the number of lines in the log when same identical attacks occur at the same time. This option may be activated or not. By default this option is disabled.
When the option is enabled, if Look ‘n’ Stop detects a large number of attacks when the threshold is reached. After this detection, no attack for the same rule are displayed in the log during the time you choose in the ‘Resume after’ field. In the above sample, if you receive 4 times the same attack during one second, other same attacks will be still blocked but not displayed in the log for 5 seconds.

Please note that the ‘Anti-Flood’ options only affects the display in the log. Packets keep to be filtered normally. A ‘F:’ prefix is displayed in the log when Look ‘n’ Stop has detected a flood.

In this option group, you may also specify the size of daily log files, and the maximum alert inside the log (when the number is reached automatically Look ‘n’ Stop will remove the oldest ones, put 0 if you don’t want a limitation).

Password option group let you to block the access to all Look ‘n’ Stop configuration if you don’t want some people to change your settings. You have to select first a password by clicking the button and then check the box ‘Enabled’ and click Ok. After that all settings in ‘Application Filtering’, ‘Internet Filtering’ and ‘Options’ pages are no longer available. Stopping the application will not be possible as well.
To come back to a standard mode, you have to click on the ‘Deactivate’ button and enter the password.
‘Lock All’ option block all controls in the Log page (remove lines and examine packet content).

Finally, the miscellaneous group proposes the following settings:

‘Advanced mode’ switch to a mode with more options and settings. See the additional features of the advanced mode.

‘Raw log’: in addition of standard text log files, this option creates log files with more information. These kind of files may be used in third party programs which decodes log files. These files are also created in the log folder and are prefixed with ‘raw’.

‘TCP Stateful Packet Inspection’: if the option is selected, Look ‘n’ Stop watches the TCP connections and verifies that all TCP inbound and outbound packets belong to an active connection. If not, an alert is displayed in the log page. If this option is selected an additional button (Connections) is available in the log patch to see the active TCP connections.

‘Keep internet filtering active after the application is left’: this option is only for Windows 2000 and XP. When enable, Internet filtering is still active even if you stop the Look ‘n’ Stop application.

‘Plugins’: Open a dialog box for selection and configuration of the plugins which add some extensions to Look ‘n’ Stop. See the plugins configuration here.

‘DLLs’: only for Windows 2000 and XP: open the dialog box for allowing/blocking the DLLs to connect to Internet. See the DLLs configuration here.

‘Protocols’ button: This open another dialog box for protocols configuration and filtering. See more information here.

‘IP to Exclude’: this field is useful if you selected the ‘Automatic Selection’ of the adapter in the options. Enter here all local IP addresses that Look ‘n’ Stop must not use to detect the right adapter (such address are 192.168.0.1, 169.254.100.1,…). To indicate a range just enter the first numbers (for instance 10 for all addresses 10.x.y.z or 169.254 for 169.254.x.y). Use a ; as a separator between addresses.

‘Confirm on Exit’: if this option is selected, a confirmation dialog box appears when clicking the Exit button.

‘Watch DNS calls’: only for Windows 2000/XP, allow to detect application that connect to internet for DNS address resolution (by default these calls are centralized under Windows 2000/XP and thus they can go unnoticed).

‘Watch thread injection’: only for Windows 2000/XP: allow to detect application that connect with a thread that has been injected by another application (and possibly a troyan).

‘Load the last ruleset when starting’: If you don’t want to automatically apply a rule set at Look ‘n’ Stop start up, unselect the option.

‘Apply the rules as soon as a new rule set is loaded’: If you don’t want to apply the rules just after a rules set has been loaded (for instance to just take a look at them) unselect the option.

Here is the list of additional features available in advanced mode:

In ‘Internet Filtering’ page: two additional columns are displayed:
to stop applying the next rules when the current rule applies and
to display an alert message if a rule applies

In ‘Log’ page: one additional button is available: ‘Track source’. This is useful to get information about the IP of the filtered packet.

Alert messages windows from ‘Application filtering’ contains two check boxes. These check boxes allow you to control more precisely how you want to accpet or not the application to connect.

Automatic rule creation in the ‘Log’ page displays two choices instead of one.

In ‘Application Filtering’ page, one additional column is available:
to allow/block applications that try to start another application that connects to Internet

In ‘Application Filtering’ page, an edit button is available to select the ports and IP for the applications.

Requirements:

· Windows XP SP2, XP, 2000, Millenium, 98 or 95
· Processor : 133 MHz or higher
· Memory : 32 Mb or higher
· Any type of Internet connection: ADSL, WiFi, Cable, …

Limitations:

· 30 days trial

What’s New in This Release: [ read full changelog ]

· is compatible with Windows Vista

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!