simplewall v2.4.5 (20 March 2019) https://www.henrypp.org/product/simplewall Download Changelog sha256 checksum
I would use DHCP and DNS only, and maybe DHCP off if you don't connect to router often (but I'd like to hear from exp ppl), for update you only need windows update and let svchost out when updating, or better yet don't use auto updates and go to windows.catalog
If I leave Windows firewall running when I activate Simplewall all ports are closed. If I turn off Windows firewall when I activate Simplewall then port 135 is open, so I don't think it is the router. This happens on both my computers running Windows 10 1809. Could there be a rule that has been left there by another program? How could I check?
Thanks. I now have just DNS, DHCP and Windows update ticked in the system rules and everything I want to use appears to work. I don't want to disable Windows update. I pause updates to control when they arrive and that works well for me.
If I use Simplewall with its default config and scan my PC with Fing, the only port found open is 139, which is Netbios. This is using Simplewall 2.4.5 on Windows 10 1803, with Windows Firewall disabled.
simplewall v2.4.6 (27 March 2019) https://www.henrypp.org/product/simplewall Download Changelog sha256 checksum
I have some problem in that sometimes Simple Wall will cause a spiking in CPU usage, sometimes System NT Authority or Windows Base filtering engine will show up, but they are related to simple wall, if I exit simple wall (rules are still on), the spiking stops and if I re-run simple wall all is back to normality (no spikes), wonder if it can be addressed somehow
You can comment your issue in here: https://github.com/henrypp/simplewall/issues Most likely @henrypp can see it there.
Hello, there is no bug, it's a feature Related to processing dropped packets thread. Need some improveent in near releases, i think
@henrypp I appreciate the feature but I think I'll unthick the logging for now, anyway crossing fingers for your product and next update - its magic , right now I think its the best really simple wall that you can learn in few minutes. I am only missing some viable way to write custom rules like you would with Windows Firewall or Comodo, I have not figured out yet - maybe I overlook something
anyone (or @henrypp) knows how to unlock skype, its in the blocklists 100%, but not sure which ip exactly, probably its just 1 or a few, since all good if I reset list to default I would like to block all but skype, otherwise you can't log in at all
@lucd untick all extra blocklist entries, it blocks third party applications (Skype, Bing, Live, Outlook, NCSI, etc.) Rules editor in user rules settings page.
thanks , in future grouping ips and naming them properly would help, ie skype: thick unthick blocklist group would be ideal (to make an example with imaginary ips, bing : ip range 102.232.2323-102.323.234, skype ip range 334.23.232-232.324.21 and so on so forth), of course if you got time and if its doable, some information about ips might be difficult to find but you could check which one stops skype with your ip set, your product is great anyway without, best regards
simplewall v3.0 Beta (7 May 2019) https://www.henrypp.org/product/simplewall Download Changelog sha256 checksum Spoiler: Changes v3.0 Beta v3.0 Beta (7 May 2019) dropped windows vista support improved dpi support (ui) moved rules list into main window added services and uwp apps tab added network connections monitor fixed displaying notifications when it's disabled fixed log file write through (issue #369) fixed notifications safety timeout fixed possible race conditions fixed services path retrieve fixed notifications cleanup improved listview resizing improved listview sorting removed blacklist mode cosmetic fixes fixed bugs
Heya, there's two ways as far i know to get this done. Enable all blocklists and then: first method: 1. Go to settings, dropped packets log, and uncheck "blocklist" from notifications (whitelist only). 2. Start skype and watch the specific blocklist (blocking skype) popup in the notifications. second method: 1. clear the current dropped packets log (ctrl-x, or through menu options) 2. Start Skype and check the log (ctrl-i, or through menu options) for entries related to skype and blocklists listed in the log. you can also combine the two methods. I do recommened excluding the blocklist option again (by checking it in options) to stop the notification spam after you resolved your issue.
simplewall v3.0.1 Beta (22 May 2019) https://www.henrypp.org/product/simplewall Download Changelog sha256 checksum Spoiler: Changes v3.0.1 Beta v3.0.1 Beta (22 May 2019) new profile structure added checking for correct xml file format before import added service name resolution for connections added Reverse DNS Lookup for IP more flexible autoresizing for listview fixed column size initialization (issue #426) fixed apps list sorting by date (issue #412) fixed status refreshing on timer deletion fixed table view for rules (issue #438) fixed connections recognition condition fixed highlighting (issue #408) fixed timers sets (issue #424) fixed services icons updated locales cosmetic fixes fixed bugs
simplewall v3.0.2 Beta (22 June 2019) https://www.henrypp.org/product/simplewall Download Changelog sha256 checksum Spoiler: Changes v3.0.2 Beta NOTE 1: New version fully compatible with 2.x versions profile NOTE 2: There is no Windows Vista support anymore (use 2.x versions instead) NOTE 3: new profile structure - all configurations are saved in "profile.xml" now (old profile version loading is supported) v3.0.2 Beta (22 June 2019) new notification ui allow microsoft update & microsoft apps servers by default added information about ports into the log moved icmp4 and icmp6 rules into custom rules improved dropped packets log markup cosmetics improved network monitoring speed improved blocklist configuration fixed saving special rules for uwp apps and services fixed tray icon dissapear sometimes (issue #450) fixed profile import does not work (issue #445) fixed semicolons in app paths (issue #462) fixed windows 20h1 uwp apps loading crash fixed parsing rules with "*" updated locales cosmetic fixes fixed bugs