I think that the vast majority of this forum's members are thankful and appreciative of the time and dedication that @alexandrud has put into this...
Does anyone know a reasonable method to backup this WFC thread? It contains a substantial body of knowledge that I would not want to lose.
You do understand that this is a user-selectable option, namely for users who would want all their WIN10 subsystems and MS updates to work -...
Responding to the complaints I see here regarding the Secure Rules option, I wonder if people would be satisfied with the following options...
It means that during the compilation of the source code into an executable by the developer (the executable is the program that you eventually...
Alexandrud, If you ever revisit your attempt to sign your code, this thread is worth its read. https://github.com/pbatard/rufus/issues/1009
How does WFC associate a rule to a program? Is the deciding factor only a program name and path? or program hash? What if a known executible with...
It can block inbound and outbound traffic, but notifies only on outbound. The outbound notification helps you not only when your machine is...
I would like to keep the current design as is. Specifically, looking at the current design's drawbacks list above: - Inaccessibility of policy...
This worked like a charm, and since the set ranges do not change that often, this is a perfectly good solution. Thanks.
Feature request (I asked for this a long time ago, but thought to surface it again): In the Security / Secure Boot option to add a textbox for a...
Thanks for the the responses. Time to look into IFL and Macrium to see if I can improve on my current tool set. @Peter2150: The Acronis BU comes...
There is quite a bit of difference between "Acronis True Image" and what they call now "Acronis Backup". Years ago I looked at both and had...
This has been discussed in the past, maybe a couple of years ago or so. There was an attempt by the developer to digitally sign the exe, but...
Thank you for the new release. I guess I don't understand the newly implemented Variant 2: I can customize the remote IP ranges when "High...
If I have to choose between Variant 1 and 2, I also prefer #2 if implemented conveniently. Variant 1 will be messy if I want to include several...
The way I envision this, considering your description how the blocking operates, is as follows (I propose one of the 2 options - Quick and Dirty...
May I suggest the following feature: To add in the Options/Secure Boot entry an option to allow a specific IP and /or port that will still get...
I get SHA1 of 6af555e99a583441a1ff55f640f62e75152d3a2e for the downloaded V.4.4.0.1. Please advise.
Feature request: When a new program attempts to connect to the internet, a wfc's pop-up window appears asking for user's approval. My request is...
May I suggest to re-word ""Find invalid rules" to ""Find orphan rules" ? "invalid" has the connotation of illegal definition, not a lost...
We developed in the past a program that dealt with tabular data. We found out that exporting the tables to Excel and let the user manipulate /...
DrSogaBan, do you have DotNet 4.0 installed on your system?
This may be a bit off, but I suggest that you look into your modem/router for a AppGuard rule there. Some Modem/Routers synch themselves to the...
I appreciate the preliminary analysis of my request. In the coming days I will experiment with your suggestion, and if I have something meaningful...
Separate names with a comma.