The Wayback Machine - https://web.archive.org/all/20050112113100/http://www.r-firewall.com:80/
R-TT Home



 
 R-Firewall

R-TT offers you a new system tool to extend security services on your computer.

R-Firewall is a FREE
program comparable with commercial firewalls!

R-Firewall is an effective and easy-to-use solution to secure your on-line activity. It protects a computer connected to a local network and/or to the Internet against any intrusions, attacks, trojans, spyware, and other external and internal threats. R-Firewall also filters out inappropriate Internet pages content and blocks dangerous active components you may get while browsing over the Internet or receiving e-mail massages.

Automatic configuration during setup allows you securely surf the Internet right after the software installation. Mobile users can create multiple and easily switchable configurations for specific network environments (Internet surfing at home, office local networks, or public Wi-Fi spots).

Please note! None of available firewalls can totally protect data or system files on a PC if the PC user mistakenly allows malicious programs to access the PC. To reinforce your file protection, we would recommend you to use R-Guard Data Security utility, a reliable firewall companion that extends your control over access rights to various valuable data files much beyond the standard Windows security services.

Download Now

Data Recovery
File Undelete
Drive Image
Data Security
File Encryption
E-Mail Recovery
MS Word Recovery
PC Privacy
Disk Cleaning
Linux Recovery
R-Studio
R-Undelete
R-Drive Image
R-Firewall
R-Guard
R-Mail
R-Word
R-Wipe&Clean
R-Linux

Contact Us Feedback Site Map


System requirements
Data Recovery An Intel-compatible platform running Windows 98/2000/XP/2003.
Email Recovery The administrative privileges under Windows 2000/XP/2003 are required during installation to install R-Firewall.



R-Firewall features
Network security features
  • Monitors network activity at the application and system component levels;
  • Detects and blocks direct network intrusions;
  • Detects and blocks network connections that malicious programs try to establish from within and outside the protected computer;
  • Detects and blocks numerous types of attacks;
  • Detects and blocks various dangerous active content on the Internet, such as JavaScript objects, ActiveX components, etc;
  • Checks e-mail attachments for dangerous content, such as executable programs, JavaScript objects, ActiveX components, etc;
  • Converts the protected computer into a "stealth" machine running invisibly to outside intruders;
  • Provides detailed log information
Content control features
  • Detects and blocks unwanted information on the Internet, such as commercial banners, pop-up windows, and cookies;
  • Blocks access to undesirable or inappropriate Web pages, specified either directly by their URLs, or by keywords;
Easy-to-use features
  • Automatic configuration during setup. Your computer is ready for surfing the Internet right after the installation;
  • Presets for most Internet applications. No need to manually set ports, protocols, or other technical staff for each installed program;
  • Multiple and easily switchable configurations that you can create for a specific network environment (for your home, for your office local network, or for a public Wi-Fi spot);
  • Two types of interfaces: Simple for inexperienced users and Advanced for fine-tuning;
  • An indefinite number of rules for each application;
  • Low resource requirements


Buy On-line ||   Registered User's Console ||   Get Invoice ||   Purchasing Request ||   Technical Support Request