Avast Avast Free Antivirus has implemented a new firewall in its free antivirus. The paid version of Avast Premium Security has added more advanced features to the firewall, such as stronger data leakage protection, spoofing protection and more. The news concerns versions for Windows.
The free firewall offers the following features:
The free version of the firewall monitors network security by monitoring and filtering inbound and outbound network traffic, preventing unauthorized access to the user’s network or shared files, and blocking dangerous inbound traffic from the Internet. The firewall monitors the network, monitors the number of connected devices, routers, network services, and operating systems used by the connected devices, and sets its mode as public or private accordingly. When a user performs more risky tasks, such as connecting to public networks in a coffee shop or airport, public mode provides high protection. It blocks all incoming connections initiated by other computers, blocks some ports / services, restricts communication with other devices, and causes the computer to be usually undetectable on the network. In private mode on networks that the user trusts, such as at home or in the office, the firewall blocks traffic only minimally, the computer is visible on the network, and by default all standard services are enabled, such as incoming remote desktop or file and printer sharing. The firewall also offers the ability to “set up and forget” for the convenience of regular users, as well as easy customization options for advanced users.
The paid firewall adds extra things:
Information leakage protection prevents computers from dropping potentially sensitive information on the network, such as user name, computer name, and e-mail. In addition, the port check feature alerts users when other malicious devices search the computer for open ports that can be exploited to detect network vulnerabilities and vulnerabilities. The firewall also alerts users to Address Resolution Protocol (ARP) spoofing, which allows cybercriminals to break into a local network by disguising their computer as part of a network so they can steal information in a man-in-the-middle attack.
–
–