Popular x64 Tags
- internet x64 download
- delete x64 download
- cookies x64 download
- password x64 download
- lock x64 download
- hide x64 download
- keylogger x64 download
- shredder x64 download
- history x64 download
- wipe x64 download
- security x64 download
- clean x64 download
- cache x64 download
- files x64 download
- protect x64 download
- data x64 download
- erase x64 download
- secure x64 download
- lost password x64 download
- software x64 download
- utility x64 download
- file x64 download
- privacy x64 download
- recovery x64 download
- forgotten password x64 download
- shred x64 download
- erase history x64 download
- remove x64 download
- registry repair programs x64 download
- evidence x64 download
Jetico Personal Firewall 2.1.0.14
Sponsored links:
license: Trialware ($39.95)
downloads: 410
size: 3.72 MB
updated: 2016-05-11
tags: firewall protection, restrict connection, network filter, firewall, block, restriction, Firewall software, Firewall, Personal Firewall, firewall protection, firewall protect, network connection, Terminal Services, Access Control
Add to Basket
Jetico Inc
Did you know that there are a lot of Bad Guys out there? Jetico Personal Firewall makes sure the Bad Guys can't harm you.
Jetico Personal FirewallTM software protects computers against hackers and malicious software when networked or connected to the Internet. It offers detailed, configurable event logs, reports, plus the option to view and edit the firewall configuration. The modular architecture is as open as possible to assist with easier evaluation of the security.
Jetico Personal Firewall Features:
* Monitor running applications that access the network
* Monitor selected/all network packets as well as selected network events
* Choose a pre-defined Security Policy — the firewall rule set
* Modify Security Policy to meet your needs
* Make your own Security Policy
etico Personal Firewall software protects computers against hackers and malicious software when networked or connected to the Internet.
Jetico Personal Firewall offers:
* Detailed and configurable event logs
* Detailed and configurable reports
* Option to view and edit the firewall configuration
The modular architecture is as open as possible to assist with easier evaluation of the security.
Benefits & Advantages
Highest protection level based on multi-level filtering
Jetico Personal Firewall establishes filters at multiple layers in the operating system. This allows the software to withstand all known attacks.
Fine tuned configuration
The firewall package contains several pre-built configurations to satisfy everyone's needs.
Live configuration
Jetico Personal Firewall Configuration explorer displays effective configuration as well as rule activity indicators.
Low resources consumption
Jetico Personal Firewall is designed to be high-performance and small footprint software.
Open architecture
The entire firewall configuration is available for user inspection and modification. Firewall filtering functions are implemented by modules. Jetico Personal Firewall contains no hidden or compiled-in features.
New Features in v.2:
System-related
Jetico Personal Firewall v2 runs as privileged Windows service. It can protect computer before user logon. Native support for Windows XP Fast User Switching and Terminal Services. Jetico Personal Firewall supports Access Control Lists for all main functions. Administrator can configure ACL to grant access to particular firewall functions for any user or group. Windows XP Service Pack 2 Security Center support.
User interface
Improved rule editing interface. New popup message. The new look for popup dialog is presented. Popup message text and rule creation options can be modified. Firewall variables formerly controlled by Configuration Wizard, are integrated into main application window. Language file support for easy localization. All translatable words and phrases are taken from single UTF-8 encoded text file.
Configuration
New XML-based open configuration file format. Detailed documentation is available upon request. The new version maintains single protected firewall configuration for all users. Simplified controls for configuration. New hash handling scheme. Separate table for hash checking. Each firewall filtering layer has own root table. New automatic variables (per-connection) for local connections are supported.
Firewall rules
Rules support lists of parameters where possible. IP rules support IP address ranges. Low level protocol rules support filtering by MAC address. Application rules have events for direct and indirect access to network. Indirect access details are also available. New module for hash checking created. Application, Process attack and Hash checking rules support wildcards in file paths.
Jetico Personal FirewallTM software protects computers against hackers and malicious software when networked or connected to the Internet. It offers detailed, configurable event logs, reports, plus the option to view and edit the firewall configuration. The modular architecture is as open as possible to assist with easier evaluation of the security.
Jetico Personal Firewall Features:
* Monitor running applications that access the network
* Monitor selected/all network packets as well as selected network events
* Choose a pre-defined Security Policy — the firewall rule set
* Modify Security Policy to meet your needs
* Make your own Security Policy
etico Personal Firewall software protects computers against hackers and malicious software when networked or connected to the Internet.
Jetico Personal Firewall offers:
* Detailed and configurable event logs
* Detailed and configurable reports
* Option to view and edit the firewall configuration
The modular architecture is as open as possible to assist with easier evaluation of the security.
Benefits & Advantages
Highest protection level based on multi-level filtering
Jetico Personal Firewall establishes filters at multiple layers in the operating system. This allows the software to withstand all known attacks.
Fine tuned configuration
The firewall package contains several pre-built configurations to satisfy everyone's needs.
Live configuration
Jetico Personal Firewall Configuration explorer displays effective configuration as well as rule activity indicators.
Low resources consumption
Jetico Personal Firewall is designed to be high-performance and small footprint software.
Open architecture
The entire firewall configuration is available for user inspection and modification. Firewall filtering functions are implemented by modules. Jetico Personal Firewall contains no hidden or compiled-in features.
New Features in v.2:
System-related
Jetico Personal Firewall v2 runs as privileged Windows service. It can protect computer before user logon. Native support for Windows XP Fast User Switching and Terminal Services. Jetico Personal Firewall supports Access Control Lists for all main functions. Administrator can configure ACL to grant access to particular firewall functions for any user or group. Windows XP Service Pack 2 Security Center support.
User interface
Improved rule editing interface. New popup message. The new look for popup dialog is presented. Popup message text and rule creation options can be modified. Firewall variables formerly controlled by Configuration Wizard, are integrated into main application window. Language file support for easy localization. All translatable words and phrases are taken from single UTF-8 encoded text file.
Configuration
New XML-based open configuration file format. Detailed documentation is available upon request. The new version maintains single protected firewall configuration for all users. Simplified controls for configuration. New hash handling scheme. Separate table for hash checking. Each firewall filtering layer has own root table. New automatic variables (per-connection) for local connections are supported.
Firewall rules
Rules support lists of parameters where possible. IP rules support IP address ranges. Low level protocol rules support filtering by MAC address. Application rules have events for direct and indirect access to network. Indirect access details are also available. New module for hash checking created. Application, Process attack and Hash checking rules support wildcards in file paths.
OS: Windows 2000, Windows 2003, Windows XP, Windows Vista, Windows Vista x64, Windows 7, Windows 7 x64, Windows 8, Windows 8 x64, Windows 10, Windows 10 x64
Add Your Review or 64-bit Compatibility Report
Top Other 64-bit downloads
Windows Defender Definition Updates March 30, 2026
Essential security updates for Windows Defender.
Freeware
O&O SafeErase Server x64 18.4.611
Deletes sensitive data so securely that a reconstruction
Trialware | $199.00
2FAGuard 1.7.2
Secure your accounts effortlessly with 2FAGuard's intuitive two-factor authentication.
Open Source
IPVanish 4.3.9.1
Secure and fast VPN service with user-friendly interface and robust features.
Shareware
Members area
Top 64-bit Downloads
-
OpenVPN x64 2.6.11
x64 open source download -
VSCryptoHash 64-bit 2.5.3.509
x64 freeware download -
Prevent Restore 119.00
x64 freeware download -
Secret Disk 321.00
x64 freeware download -
O&O SafeErase Server
x64 18.4.611
x64 trialware download -
Wipe 2603.00
x64 freeware download -
Microsoft Standalone
System Sweeper (x64 bit) 1.0.856.0 Beta
x64 freeware download -
Hash Suite 4.0
x64 shareware download -
Transparent Lock Screen 26.2.0.5140
x64 shareware download -
Romaco Timeout x64 3.1.4.0
x64 freeware download
Top Downloads
-
OpenVPN x64 2.6.11
open source download -
Aiseesoft Android
Unlocker 1.1.16
shareware download -
CmosPwd 5.0
freeware download -
ClamWin Portable 0.103.2.1
open source download -
NordVPN 7.56.2.0
demo download -
Video Padlock 1.20
demo download -
SymlexVPN 3.1.7
shareware download -
WebPost Tools 1.0.0.412
freeware download -
Portable SafeInCloud 24.14.1
freeware download -
Windows Defender
Definition Updates March 30, 2026
freeware download -
OSV-Scanner 2.3.5
open source download -
CRYPTO! Build 9695
freeware download -
DigiVault 1.0.006
freeware download -
GhostVolt 1.3.3.0
demo download -
abylon KEYSAFE 23.60.1
shareware download











