I still like BlackIce and AtGuard combo over ZA. I tried ZA's free and pro versions, and they both seem to lack the "granular" level control and notifications I want. By default, ZA seems to "allow access to all ports and protocols" for any app that you allow access to the internet. Furthermore, if you choose "allow access for ONLY the ports checked below" and input the ports; e.g., 25 and 110 for e-mail, where is the setting to enable traffic on those ports to only certain sites -- namely, your ISP's e-mail server? I imagine that there must be a way to do this in ZA, but since it isn't readily apparent I think I'll pass. Also, I've noticed an inordinate number of rogue, nonstandard port requests. For example, IE wants to go to a regular web page, and is allowed to access ports 80, 443, 8000, 8080, etc. -- but ZA won't let it because it wants to touch port 2637 (and others) for some reason. What's up with that? :|
In contrast, AtGuard is very straightforward. It
denies all incoming and outgoing traffic by default, and always asks if X incoming/outgoing port is OK for X address. No frills, no surprises, no mistakes. Although AG won't have any more updates (since Symantec absorbed AG into Norton firewall), I don't really think I'll need one. I use it for its good port blocking features -- and a port is a port.
😉
I read that AG apparently failed the leak test, but my AG/BI combo didn't. Also, I never get anything but 100% stealth on all ports on
ShieldsUP. Between AtGuard's firewall and BlackIce's intrusion detection (and a little tinkering with Windows' file sharing/security settings) I've successfully repelled scans/hacks from everyone from script kiddies to CISSP's. In addition to the off-the-shelf basic "hacker tools" like 7th sphere port scan, ws ping propack, NTO scanner, superscan, et al, I've also shrugged off "doorknob rattling," intrusion, DoS, etc. attempts from ISS Scanner, CyberCop Scanner, satan, nmap, SNMPwalk, etc. Pretty good for a software solution I think.
😀