Xvirus Personal Firewall

Monitor incoming and outgoing traffic and blacklist applications from connecting to the Internet using this personal firewall, which can work alongside the native Windows one.

  • Xvirus Personal Firewall
  • Version :4.5.0.0
  • License :Demo
  • OS :Windows All
  • Publisher :Mysecuritywin

Download Now

Xvirus Personal Firewall Description

Xvirus Personal Firewall is designed as a simple application that enables the user to check all active connections and control which are granted access or not.

Brief installation, initial configuration

Before installing the product you should know that .NET Framework is required on the system for the firewall to function.

Getting the application on the computer is a simple task that does not involve too much user input. A brief configuration wizard allows you to set everything up by creating the default lists of programs that are approved or denied connectivity, based on a list of running processes.

Simple and appealing looks

The interface is nothing complicated. All the options are neatly organized in an appealing layout that allows easy handling.

On one side the product displays the current security state of the system according to its assessment while in the right part of the application window there is the configuration panel, which includes access to the trusted and blocked applications lists.

Working with the application

Just like the interface, handling Xvirus Personal Firewall is simple, mainly bacause of the short amount of options available.

Basically, the product provides access to the processes that are engaged in a connection and enables you to block or allow them. There is also the possibility to cut off network connectivity.

During our tests, however, Xvirus Personal Firewall showed instability problems as it generated errors on many occasions.

Conclusion

Xvirus Personal Firewall is a straightforward application that relies on whitelisting and blacklisting for managing the connections. There are no parameters to set up or other assessment capabilities that could determine the legitimacy of a connection.

Leave a Reply

Your email address will not be published. Required fields are marked *