What can be the best way of telling a thief that your car is ready to be stolen? Simple! Just leave the car doors unlocked and the keys in its keyhole. Chances are that sooner or later, the thief will inevitably steal the car. Likewise, what can be the best way of asking a hacker to steal your personal documents? Simple! Just log on to the Internet without using a firewall.
What is a Firewall
A firewall is software (and in some cases also hardware) that helps protect your computer from malicious attacks of hackers. In simplest of all terms, it helps prevent applications and some files designed into the operating system from accessing the network. When I say applications, I simply mean all types of applications including web-browsers, chat-engines, FTP software and other operating system specific files. A firewall will help prevent Trojan attacks, spyware, spam, worms, phishing and similar malicious attacks.
Sygate – The Company
Sygate is a company that was previously known as Sybergen and has a long history of quality products. This was the first company to create a domestic firewall that used stealth technology. The Sygate personal firewall is one of the best known and most popular freely available firewall on the Internet. The company was earlier this year bought by Symantec, the leaders in network security systems.
Sygate – The Firewall
A simple setup file of about 8.5MB approximately can be downloaded from https://sygate.com and installed on your computer. The installation procedure itself is very simple although it may require a system restart after the installation is complete.
Simply put, Sygate is one of the best software based firewalls available on the Internet. Lets get into the nitty-gritty of this software. Upon installation, the firewall appears as an icon in the system-tray. Double-click it and you are presented with a screen displaying traffic and attack history graphs. On the left hand side graph, it will show the incoming and outgoing traffic graph while the right hand side graph shows the attack history. At the same time, it will show you a list of the applications and files that are trying to access the network.
The first and foremost thing to do after installing Sygate Personal Firewall is to set permission levels for the softwares to access the network. Whenever an application tries to access the network, Sygate prompts you with a warning message asking you whether you would let the application use the network. You can set the permission levels to Yes, No and Ask Everytime. This is an essential component of setting up the firewall as this helps you keep a tap on the files that can access the network. This is particularly useful in case of virus attack when certain .exe files may get embedded in some hidden folders and may try to access the network. Sygate will prompt you whenever any new file tries to access the network, indicating its name, path and accessibility options. If you know what you are doing, you will successfully be able to stop the file from accessing the network.
Additionally, Sygate keeps a log of traffic and packets that have been transferred between your computer and the network. This is particularly useful in keeping a check on what types of protocols are used to access different services of the network. All services need not necessarily work on the TCP protocol. Hence a log of services using the UDP, ICMP and other protocols may be helpful for a network administrator. Similarly, there is a log available for security levels and for packet filtering. A security log can also do a back-trace to check on a potential security threat.
A Security Test button is available which will take you to the Sygate website. Here your computer will be scanned by an array of diagnostic tests aimed at checking how secure your computer is over the network. Tip of the day for Sygate users: Run this test with and without running the firewall and see the difference!
You can set additional security rules that will override the normal measures that the firewall takes while at work. For instance, if you know the IP Address of a domain, you can simply block it by using these security rules. There are other options available for them too, like you can set permission levels for more than one network adapters and you can change access levels for different web pages under the same domain. An expert hand is often very useful in such scenarios.
I can only compare Sygate firewall to Zone Alarm that I have used for only a few days. The one major change that I immediately noticed after installing Zone Alarm was that the network utilization shot up instantly after installing it. I don’t know how or why because Zone Alarm did not immediately give any indication of any files accessing the network. I presumed that there was some updating going on in the background. The interface of Sygate is, on the in contrast to that of Zone Alarm, more user-friendly, with no attempts being made to make it look attractive. Simply put, Sygate has as simple a user-interface as there can be! Your experience would be very similar to just install it and forget it.
Most users of Windows XP would be familiar with the Windows Firewall too. This firewall has been enhanced greatly in SP2 and incorporates a lot of features of Sygate. It ultimately is the users’ choice whether he wants to use Windows Firewall or third-party software although my personal preference would always be Sygate personal firewall.
System Requirements
CPU: 200MHz or higher
RAM: 32MB
Hard Disk: 12.5MB (approx)
OS: Win 98/ME/2000/XP
Verdict
If you are looking for a killer app, then this is one for you. It will kill all deadly intrusions and protect all your data from being accessible to the network. Download it, install it, restart your PC and forget it. It is as simple as that!
- Thank You! We appreciate your effort.