Restrict which programs Firewall allows to be run.

Posted on 2003-02-24
Medium Priority
Last Modified: 2013-11-16
I am running Windows2000 server., connected to the internet via a router.

I would like to install a firewall to only allow the client logging in to be running my program on THEIR computer.  eg   client.exe

The client.exe program running on their computer will allways be logging in on port 1002., winsock.
My program client.exe has a login password  to the server which is encrypted, and the program is unable to proceed without verification.

Unfortunately i will also have to have access, from only my computer, using pcanywhere.


Which firewall program would you recommend i buy for this

Appreciate any help
Question by:kennedymr
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
LVL 79

Accepted Solution

lrmoore earned 400 total points
ID: 8021002
My recommendation is a Cisco PIX, only because I am most familiar with it. It all depends on your budget, how many users will be accessing your application, and what else this firewall will need to do.
What kind of connectivity do you currently have? Broadband, DSL, Cable, T1? Do you currently have a router?
LVL 33

Expert Comment

by:Dave Howe
ID: 8024139
I would suggest Kerio Personal Firewall from www.kerio.com
This would give you the following.
1. ability to limit which programs on your machine can listen/talk on ports, to/from what addresses, and specify times of the day this applies
2. ability to reconfigure (1) remotely
3. ability to observe what ports are currently in use, by what programs, to what addresses
4. again, ability to do (3) remotely
5. ability to specify certain actions be logged, either to the local machine or to a third machine elsewhere on the network (syslog/udp support)
6. free trial (actually unlimited, but legally you are obliged to buy a licence if you trial for more than 30 days and are a "commercial" user)

anyhow, go download and try it. if you don't like it - well, it didn't cost you anything to try.
LVL 79

Expert Comment

ID: 8452954
Why use a firewall? Good security primer:
More good basic information:

Free/low cost software firewalls
Zone Alarm:
Kerio is good:
Panda Software has an Antivirus with built in firewall:
BlackIce Defender

While you're at it, don't forget about spyware and adware.
Spybot Search and Destroy:

Hardare appliance firewalls:
Ciso PIX

Small office/home office - SOHO

And, of course, your Linux firewalls:
FloppyFW -- http://www.zelow.no/floppyfw
Linux Router Project -- http://www.linuxrouter.org
FirePlug -- http://edge.fireplug.net
Coyote Linux -- http://www.coyotelinux.com

-disclaimer: This is not an all-inclusive list. There will be someone with experience in other
products that can be just as good, just as effective as any of these produts lists.
Bringing Advanced Authentication to the SMB Market

WatchGuard announces the acquisition of advanced authentication provider, Datablink, with one mission – to bring secure authentication to SMB, mid-market, and distributed enterprises with a cloud-based solution, ideal for resale via their established channel & MSSP community.

LVL 79

Expert Comment

ID: 8904631
No comment has been added lately (69 days), so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area for this question:

RECOMMENDATION: Award points to lrmoore http:#8021002

Please leave any comments here within 7 days.

-- Please DO NOT accept this comment as an answer ! --


EE Cleanup Volunteer
LVL 33

Expert Comment

by:Dave Howe
ID: 8915776
Maybe lrmoore *does* deserve the points - just for the sheer chuzpa of "recommending" he is awarded them :)
LVL 33

Expert Comment

by:Dave Howe
ID: 8915785
lrmoore's third answer is certainly the most complete though - if suspiciously cut-and-paste looking - and worth the points.

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month15 days, 10 hours left to enroll

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question