Ha! Just checked again, and it still quoting that 825 number. So it is a static number, not even random, LOL!
I just checked and saw the same thing, it added a 10 minute countdown to claim the offer. Of course after clearing sandbox and reopening the page the timer reset. Also coupon codes were exactly the same meaning the offer doesn't actually expire after the timer, it's just pressure selling giving you less time to think. Hate that type of thing.
You know what they can do with their pop-up offer. Spammers! Trash of a company. Waste of money. NoVirusThanks Connections Viewer is better in all ways. Would never use GW as a firewall.
i want something that can monitor my outbound connections, i've got simplewall, would GW work fine with simplewall? i could block GW connections with simplewall has anyone tried this?
The pretty graph on the right indicates which apps are currently outbounding. All apps that have ever connected are listed on this page. I've just screenied four for the insert. The larger shot shows the connections logged for, in this example, today's Firefox, other time spans can be selected. Kinda sorta monitoring on steroids. You decide. And GW is much more than monitoring: https://www.glasswire.com/features/#internet-security Good stand-alone monitors are Sysinternals' TCPView and Nirsoft's CurrPorts, the latter having user built filters, column settings and other features not available in the former. I think one of these is what you're looking for.
Is there any way to show port information in GlassWire? It seems all outgoing traffic to unrecognised ports are lazily thrown under the heading "other" with no further information. Not needed for all traffic but I feel it should be possible to see remote hosts and ports for any traffic labelled "other".
I'm not sure lazily is justified. You probably know this but for the benefit of all, an outbound port can be named if well-known (1-1023) or registered (1024-49151) and in the latter, it's merely "registered." In the ephemeral range (49152-65535), it's The Wild Frontier. In this screenshot, GW has done a good job of IDing traffic attaching well-known and registered names to valid port numbers, some of which has contributed to help tweaking my network security scheme. I have a lot of traffic as Other since I don't use either of the well-known ports for the FTP app I use for daily backups to my LAN NAS. There's some Other traffic for svchost.exe which is perplexing. I've been wanting to dig into that, but I'm... lazy. Then again, I don't depend on GW for precise, targeted forensics. If Other is a worrisome, consider trying Nirsoft's CurrPorts. Build a filter like "include:remote:tcpudp:1024-49151" with that range used here as an example; the web page has more info on filters. Watch the remote port column for the weird stuff and make note of the PIDs. Use that data for further research. Unfortunately, there's no logging so you'd need to watch in real time. His TcpLogView would do that, but no filters.
I guess you could call it IDing; It just replaces port with "expected traffic for that port". You could for instance send http traffic over port 53 and GW will incorrectly label it DNS traffic. The way it's presented in GW could be misleading to people who think actually traffic inspection and IDing is taking place. I don't depend on it for forensics either, I rarely run it, I was just curious. Given it's high price tag it seems to lack some basic elements I'd expect in a network monitor. In other areas it excels.
True. Thanks for catching that; I was a bit too cavalier in writing that up. I've edited accordingly. Clearly, GW isn't up to catching such a sneaky and nefarious activity as sending HTTP traffic over port 53. But as you say, in other areas it excels and that's what I use it for, even though the artsy-fartsy GUI drives me nuts. Which goes for just about everything these days. Cheers.
I was refering to the way it's presented in GW being potentially misleading, not your post . Edited accordingly.
Glasswire is one of them programs that everyone starts to love and it's 'for the people'. Then in time some big corp will waive a million or more around and buy them out. And the program will then be made heavy on the system, bugs that never get fixed, and just ran into the ground and eventually get a name change and disappear. Enjoy it while you can.
I like GlassWire. Seems to have some nice folks running the business, and they are very responsive over on their forum. The firewall alerts and usage data are very useful, and let you know what is connecting at a glance. Of course Windows comes with a Firewall, but manually configuring the outbound rules can be a pain. All firewalls now are basically front ends for the Windows Filtering Platform (WFP). Of them all, I prefer GlassWire. https://docs.microsoft.com/en-us/windows/win32/fwp/windows-filtering-platform-start-page
I've been using GlassWire for years on several Win 7 and 10 systems over time. And I second all of Tinstaafl's post. (I also use GW free on my two Android devices. The paid version has a firewall, but I prefer the one in AdGuard.) See my post #366 on the previous page, 15. And posts #165 & #170 on page 7. GW is more than a front-end for Windows' firewall. The download trials for 14 days, then you pay or it goes into a free connection monitoring only mode, firewall front-end reverts to Windows' defaults and security features are disabled. While in trail, there'll be discounts offered. That's how I remember it; I could stand to be corrected. Believe it or not, there's plenty of info here: https://www.glasswire.com/features/