Source
Protects your applications from undesirable network incoming and outgoing activity, controls applications internet access. Allows you to control personal information leakage via controlling application network traffic.
Manages and synchronizes port forwarding provided by external network connection (firewall/router) box with applications requirements and activity.
Wednesday, July 29, 2009
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment