ID Firewall v1.2

ID Firewall
The screenshot above is hosted and provided by Please contact them directly for any copyright infringement as we are not responsible for that content.

10% Discount Coupon for ID Firewall: GSAS-65HG-IETP
Download ID Firewall

Homepage of ID Firewall

Buy ID Firewall 10% discount coupon
47 USD

Votes: 0
DL: 9

Last Update:2007-06-17 - Major Update: Bugs fixed
Requirements:Internet Explorer 5, 20 Mb free RAM
Limitations:14 Trial
Category:Security & Privacy::Access Control


ID Firewall is a high-priority security program responsible for your computer's real-time protection against hackers. It blocks access to unauthorized attempts to use your computer, making sure your computer stays safe, free from exposure to internal network attacks, as well as external Internet ones.

Main Features:

  • Monitors program running-attempts

  • Denies access to unauthorized programs

  • Filters at a low level the traffic

  • Reports detailed logging network activity

  • Manages the bandwidth for an application

Detailed features:

  • Monitors attempts of all applications trying to run on your computer and filters them according to defined user access rules. You can choose which programs have authorization to run and decide which ones to block.

  • Prevents execution of unauthorized programs. Every attempt to start a program is intercepted and checked by ID Firewall against a user-defined set of rules and permission to run is requested for any program not on that list. Also, a warning sign to run a program shows up in case of an unidentified publisher.

  • Denies access to a series of files, including registry key access, for unauthorized users. Also, real time monitoring of file access ensures better protection by keeping an accurate record of users.

  • Monitors the process list, showing you exact data regarding programs and applications that use the processor. You can use this feature to deny access or to stop suspicious programs from running on your computer thus keeping it safe from any damage or from information loss.

  • Prevents loading of DLLs by running processes. Every attempt to load a DLL or any other type of library file is intercepted and checked for permission, ensuring deeper protection against viruses, Trojans and other spyware and adware.

  • Displays detailed network activity logging and keeps record of all network events. In case of a threat, the user can use an emergency button  to stop all network transfer.

network attacks - network - internet - blocks - unauthorized - hackers - firewall - id firewall - protect - privacy - clean - erase - shield - spyware - antispyware - security suite

Contentwise responsible person: Fastlink2, Moselstr.12, 51371 Leverkusen, NRW, Germany
Cristina Mailat, support(at)fastlink2(dot)com