This is how to steath your ports, just in case you still have not figured it out. Also, remember to assign your network interface to proper zones.
All my ports are stealthed instead of closed with my TPF. You probably should consider checking/modifying your TPF rules to have your ports...
I have read through the announcement numerous times. I am well aware of the acquisition for a long time. However, I could never find any statement...
Yes, Tiny Firewall uses Snort rules. I have IDS on with my TPF.
Tiny is a monster for many new users, including myself when I started to use it. Fortunately, there are so many other good firewalls on the market...
[ATTACH] Did you enable 'Track n Reverse' during software installation? I have an example above: the installation file of CCleaner is...
[ATTACH] After you stop the tracking, there should be a list of installations in the left panel. High light an item, for example, 'Opera';...
Which version of TPF are you using? Only the Pro version has the Track 'n' Reverse Function. In the Pro version, you can click 'Run Tracklog...
TPF is still under development at this time, a new build probably will be released in several weeks. This information was given out by a Tiny...
Yeah, I agree.
Another vote to Ad Muncher. I have tried quite some Ad filters. 1) Proxomitron - It is very powerful. However, it is a dead project because...
There is an old saying says that, if you feel something is difficult to do, it is because you do not really know how to do it; if you really know...
Paid: ShadowUser Tiny Personal Firewall KAV Free: Opera
It is quite possible that some needed system privileges, code injection, or whatever is blocked by your TPF rules, which lead to your Port...
I can not quite understand why O&O Defrag seems not popular here at Wilders. Its UI is nice, it takes little resource, and it is fast. More...
I do not think ShadowUser alone is good enough either. More generally, a single security software is never the approach. 1) Every software has...
I agree with what Texcritter and WSFuser said. You probably also want to remove all the temporary files and junk files before you do the...
I would have to say that HIPS is not that suitable for a system that is under significant changes. Instead, it is good for a 'stable' system. This...
Please do not take me wrong. I do agree that those popups of HIPS are annoying sometimes. But like it or not, as you have said, that's the cost of...
I would choose Tiny Firewall. But I am not sure if it is a suite or not, as it is already much more than a firewall. If Tiny is not allowed...
For me, the first choice is always the site of the company who has made the software. Directly download from the author's site, there would be...
It all depends on the user's practice. It has always been suggested that one should only download trusted software from trusted sites. The more...
The detection of HIPS is based on the abnormal behavoir of the system. The under-lying assumption for the use of HIPS is that the user knows the...
I have never tried Mcafee, so I am not sure if host intrusion prevention is available in Mcafee firewall. HIPS is hot on the market of home...
I had no problem to log on so far. Some logon info was lost because of the HDD crash sometime before, and I had to re-create my user name and...
Separate names with a comma.