Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ZoneAlarm Security Suite 6.0

Sliders help you choose the best general firewall settings.

Click to Enlarge

You can view a list of your applications, and toggle rights for each one to Allow it access to the Internet Zone or the Trusted Zone, Block it from access to each of those areas, or Ask each time whether it should have access. Every application can be allowed or denied the right to Send Mail, as well (blocking mail rights prevents a program from being used as a mailer by a third party). When it scanned my system, I found that ZoneAlarm made pretty good calls on which rights to assign to each application, so you can get it going, then tweak later. Zone Labs also performs many of these duties for AOL, ICQ, MSN, and/or Yahoo instant messaging in its IM Protection module.

ZoneAlarm Security Suite 6.0 boasts a new level of protection. Until now, the firewall protection stopped access at the network and program level. The new protection is what ZoneAlarm calls an 'OS firewall,' built on a behavior-based strategy that monitors activity at the kernel-level. The new approach promises to quickly blow the whistle on Trojans and keyloggers by closely monitoring internal computing resources, such as vital files, registry keys, and start-up processes. When ZoneAlarm sees unusual activity between applications, it can put the kibosh on memory being read, or quash unauthorized driver and service loading.

Version 6.0 helps protect programs from hijacking, stops browser home page hijackings, and Web browser changes caused by Browser Helper Objects (DLLs that customize and control Internet Explorer). Also new to 6.0 is unsecured wireless detection, and automatic selection of the right protection for the exposed wireless network. Automatic network detection has been enhanced too — both wired and wireless.

A good illustration of how ZoneAlarm can spring into action occurred when I went to use a dial-up. A hardware firewall sits between the Internet and my Ethernet network, but that firewall is useless when I dial in with a modem. Instead, ZoneAlarm's firewall responded to a barrage of attacks that never made it inside the front door. ZoneAlarm also flags unauthorized outbound attempts from the computer to the Net — whether through dial-up or Ethernet — something the hardware firewall cannot do.

  • 1