The best soultion is a 2 layer approach.You are looking for a program that opens all ports then whenever requests come in it accepts them and sends a reply like authorization not allow. Then get a packet sniffer and run it (especially overnight) it is the only thing that will deter above average hackers and will give you their network addy and ethernet mac for prosecution (and DO PROSECUTE attempts and success!). BI and ZA have a fatal flaw that makes them weak. They both rely on time to judge attacks and ip's to verify hack attemps. Both of these are easily manipulated by a hacker of any skill. Also I am able to ACK tunnel by both of them.
