StealthNetWall 1.2

License: Free Trial ‎File size: 1.09 MB
‎Users Rating: 3.0/5 - ‎1 ‎votes

The StealthNetWall(TM) firewall is a true IP Packet filter. It will prevent attacks to your computer and block all PINGS and Trace Routes to your computer. It is simple to install, and there is no complicated configuration needed to protect you from the hackers on the Internet. It is security in a box solution. Most firewalls are large and memory consuming applications running on your computers. Some are difficult to understand and configure. The StealthNetWall(TM) product is a kernel level IP packet filtering firewall which protects you from hackers on any network. StealthNetWall(TM) will protect your computer from the following: malformed IP packets, IP packets that contain options, Pings, and Traceroutes; and it will also prevent any ICMP redirect requests to your computer. With these features, you will not need to be concerned about your connections to the Internet taking a detour through a hacker's network or about hackers being aware of your computer's presence on the Internet. Use the StealthNetWall(TM)IP Packet filter to make your computer invisible on the Internet or at your office.

VERSION HISTORY

  • Version 1.2 posted on 2003-07-14

Program Details

EULA

Stealth Internet Services, Inc. End User License Agreement This End-User License Agreement (the "Agreement") is an agreement between you (both the individual installing the Product and any legal entity on whose behalf such individual is acting) (hereinafter "You" or " Your") and Stealth Internet Services, Inc.. (hereinafter "STEALTH"). TAKING ANY STEP TO SET-UP OR INSTALL THE PRODUCT CONSTITUTES YOUR ASSENT TO AND ACCEPTANCE OF THIS END USER LICENSE AGREEMENT. WRITTEN APPROVAL IS NOT A PREREQUISITE TO THE VALIDITY OR ENFORCEABILITY OF THIS AGREEMENT AND NO SOLICITATION OF ANY SUCH WRITTEN APPROVAL BY OR ON BEHALF OF YOU SHALL BE CONSTRUED AS AN INFERENCE TO THE CONTRARY. IF YOU HAVE ORDERED THIS PRODUCT AND SUCH ORDER IS CONSIDERED AN OFFER BY YOU, STEALTH'S ACCEPTANCE OF YOUR OFFER IS EXPRESSLY CONDITIONAL ON YOUR ASSENT TO THE TERMS OF THIS AGREEMENT, TO THE EXCLUSION OF ALL OTHER TERMS. IF THESE TERMS ARE CONSIDERED AN OFFER BY STEALTH, YOUR ACCEPTANCE IS EXPRESSLY LIMITED TO THE TERMS OF THIS AGREEMENT. IF YOU DO NOT AGREE WITH ALL THE TERMS OF THIS AGREEMENT, YOU MUST RETURN THIS PRODUCT WITH THE ORIGINAL PACKAGE AND THE PROOF OF PAYMENT TO THE PLACE YOU OBTAINED IT FOR A FULL REFUND. 1. DEFINITIONS: 1.1 "Product" means the object code copy of the software program provided to You in association with this Agreement, together with the associated original electronic media and all accompanying manuals and other documentation, and together with all enhancements, upgrades, and extensions thereto that may be provided by STEALTH to You from time to time. 1.2 "Licensed Configuration" means the choice of features and any other hardware or software specifications, as declared by You in Your purchase order, or request for License Key, and upon which the licensing fee was based. 1.3 "Licensed-server" means the server (defined by the host ID identified by You to STEALTH when obtaining the License Key) which enables the Product to operate in accordance with the Licensed Configuration. 1.4 "License Key" means the code provided to You by STEALTH which enables the Product to operate on the Licensed-server for the specified Licensed Configuration. 1.5 "Third Party Software" means any software programs provided by third parties contained in the Product. 1.6 "Third Party Software Provider" means the third party which has the right to provide and grant licenses for the use of Third Party Software. 2. LICENSE AND RESTRICTIONS: 2.1 License. Subject to the terms and conditions of this Agreement, STEALTH hereby grants only to You, a non-exclusive, non-sublicensable, non-transferable license to use the copy of the Product in accordance with the relevant end user documentation provided by STEALTH only on the Licensed-server and only for the Licensed Configuration. You have no right to receive, use or examine any source code or design documentation relating to the Product. 2.2 General Restrictions. Except for one copy solely for back-