NCF Capabilities
NCF provides an easy-to-use interface. To effectively use NCF, you do not need to know the inner workings of Windows*. The default settings are configured for you. However, you can change any of these many settings at any time. These are covered later in this manual.
A tremendous strength of NCF is its modular organization. NCF's capabilities are implemented as special modules called plug-ins, files with the .ofp extension. Each module is independent and can easily be added to an installed system.
Following are the major benefits of NCF:
- Protects you against the full spectrum of security threats from privacy issues to data leaks and exploits.
- Can be used immediately after installation without any customization.
- Can be auto-configured for best protection, or will let you easily create your custom secure configuration very quickly using system prompts and default settings without interrupting your work.
- Performs very complicated adjustments to the security of your system with just a few keystrokes.
- Can be used to restrict network access both to your computer and from your applications. Advanced users can also adjust service protocols and create special security facilities as required.
- Has a stealth mode that makes your computer invisible to hackers while letting you browse the Internet as usual.
- Has a modular system structure that lets you add new protective modules in the form of plug-ins.
- Is compatible with all versions of Windows 98/2000/ME/NT/XP.
- Has minimal system requirements.
- Can restrict a list of applications having access to the network and specify acceptable protocols, ports, and directions of access (incoming or outgoing) for each of these applications.
- Can block or restrict nonrequested information being sent to your computer, such as the following in particular:
- Banner advertisements
- Pop-up windows on Web pages
- Inappropriate content data from specific Web pages
- Can restrict or prohibit the action of program components built into Web pages, such as Java applets, ActiveX scripts, and JavaScript*.
- Can restrict or prohibit the use of cookies.
- Specify a zone of friendly IP addresses (your own LAN, for example). In this zone, NCF does not control or restrict network exchange.
- Can quarantine e-mail attachments to protect your system from Internet worms.
- Can warn of any indication of someone attempting an attack on your computer from any other computer and instantly prevent access.
- Has an advanced database-driven log system that supports custom queries for data mining tasks.
- Is successful with all known leak-tests.