ARP spoofing — Address Resolution Protocol (ARP) spoofing, also known as ARP poisoning or ARP Poison Routing (APR), is a technique used to attack an Ethernet wired or wireless network which may allow an attacker to sniff data frames on a local area network… … Wikipedia
Netfilter — Development status Active Type firewall tools for Linux. License GNU General Public License Website http://www.netfilter.org/ … Wikipedia
nftables — Original author(s) Patrick McHardy Stable release 0.01 alpha1 / March 18, 2009; 2 years ago (2009 03 18) Preview release GIT … Wikipedia
Personal firewall — A personal firewall is an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy. Typically it works as an application layer firewall. A personal firewall differs from a… … Wikipedia
Windows Live OneCare — A screenshot of Windows Live OneCare 2.5.2900.03 … Wikipedia
Context-based access control — (CBAC) intelligently filters TCP and UDP packets based on application layer protocol session information and can be used for intranets, extranets and internets. CBAC can be configured to permit specified TCP and UDP traffic through a firewall… … Wikipedia
Application firewall — An application firewall is a form of firewall which controls input, output, and/or access from, to, or by an application or service. It operates by monitoring and potentially blocking the input, output, or system service calls which do not meet… … Wikipedia
ZoneAlarm — Extreme Security 2012 D … Wikipedia
Check Point Integrity — is an endpoint security software product developed by Check Point Software Technologies. It is designed to protect personal computers and the networks they connect to from computer worms, Trojan horses, spyware, and intrusion attempts by hackers … Wikipedia
Outpost Firewall Pro — Developer(s) Agnitum Stable release … Wikipedia