106 *Add 107 *Delete 109 *Apply 110 *Undo 111 *Edit 112 *Up 113 *Down 114 *APP: Stopped 115 *APP: Allowed 116 *APP: Asked 117 *NA 118 *APP: TCP port not allowed 119 *APP: IP address not allowed for TCP 120 *APP: UDP port not allowed 121 *APP: IP address not allowed for UDP 122 *APP: Allow UDP 123 *APP: Allow TCP 124 *Remove All 125 *Details 126 *Firewall History 127 *Remove 128 *Advanced Rules 129 *General 130 *Filtering 131 *Refresh 132 *Application Settings 133 *Active Applications 134 *Authorized or Blocked Applications 135 *Enable Firewall 136 *bytes 137 *Allow/Block Application 138 *Logging application rules \nGreen Tick: Log \nRed Cross:Don't log 139 *Application Icon 142 *Activate/Deactivate rule 145 *U/D 146 *Date 147 *Rule 148 *Type 149 *Source/Destination 150 *Additional 153 *Confirm Action 155 *Import ... 156 *Adapter Settings 157 *IPv4 or IPv6 158 *IP6 over IP4 159 *General options: 160 *Display traffic information in tray icon 161 *Application filtering enabled 163 *Packet filtering enabled 164 *Auto Refresh 165 *Outbound 166 *Inbound 167 *0 : Echo Reply 168 *3 : Destination Unreachable 169 *0 : net unreachable 170 *1 : host unreachable 171 *2 : protocol unreachable 172 *3 : port unreachable 173 *4 : fragmentation needed and DF set 174 *5 : source route failed 175 *4 : Source Quench 176 *5 : Redirect 177 *8 : Echo 178 *9 : Router advertisement 179 *10 : Router selection 180 *11 : Time Exceeded 181 *12 : Parameter Problem 182 *13 : Timestamp 183 *14 : Timestamp Reply 184 *15 : Information Request 185 *16 : Information Reply 186 *17 : Address Mask Request 187 *18 : Address Mask Reply 188 *30 : Traceroute 189 *31 : Datagram Conversion Error 190 *0 : time to live exceeded in transit 191 *1 : fragment reassembly time exceeded 192 *0 : pointer indicates the error 193 *0 : Redirect datagrams for the Network 194 *1 : Redirect datagrams for the Host 195 *2 : Redirect datagrams for the Type of Service and Network 196 *3 : Redirect datagrams for the Type of Service and Host 197 *The application is attemting to access the Internet. 199 *EXE (Executables, *.exe)|*.exe|| 200 *Application already exists in the list 201 *Add Application 202 *Allow 203 *Block 205 *Location 206 *Application not available 207 *You have made changes to the settings on this page. Do you want to keep these changes? 208 *PC Tools Firewall 209 *You have made changes to the filters. Would you like to apply these changes now? 210 *All 211 *47-GRE 212 *ICMP 213 *IGMP 214 *Other 215 *50-SIPP-ESP 216 *TCP 217 *TCP or UDP 218 *UDP 219 *Change Protocol 220 *Inbound 221 *Outbound 222 *Change Direction 223 *Block 225 *Log 226 *stop processing more rules 228 *where the direction is 229 *where the local ethernet address is 230 *where the remote ethernet is 231 *where the ethernet type is 232 *where the ICMP code is 233 *where the ICMP type is 234 *where the local IP is 235 *where the local IPv6 is 236 *where the local port is 237 *where the protocol is 238 *where the remote IP is 239 *where the remote IPv6 is 240 *where the remote port is 241 *Change ICMP Type 242 *Undefined 243 *All 244 *Change ICMP Code 245 *Change local address 246 *Change remote address 247 *Equal to my address 248 *Different from my address 249 *and 250 *or 251 *Network 252 *Mask 253 *Change remote IPv6 address 254 *Change local IPv6 address 255 *Change local port 256 *Change remote port 257 *Change ethernet type 258 *Other 259 *on every packet 260 *Allow 261 *Match Local IP address 262 *Match Remote IP address 263 *End address is below than start address. 264 *Input error 265 *Same 266 *Different 267 *Address 268 *Not Mask 269 *Equals 270 *Equals or 271 *Doesn't equal 272 *Start 273 *End 274 *In Range A:B 275 *Out Range A:B 276 *Match Local TCP or UDP Port 277 *Match Remote TCP or UDP Port 278 *Does not equal and 279 *User defined service 280 *Port 281 *Match Local IPv6 address 282 *Match Remote IPv6 Address 283 *Rule should perform either allow or block action 284 *No Action 285 *Rule logic is invalid. Please modify the rule. 286 *Invalid rule 287 *OK 288 *Cancel 289 *Close 290 *What do you want done with the packet? 291 *Step 1: Select &action(s) 292 *Step 2: Edit the rule &description (click an underlined value) 293 *Which condition(s) do you want to check? 294 *Step 1: Select &condition(s) 295 *Step 2: Edit the rule &description (click an underlined value) 296 *Select communication direction 297 *Outbound (from your computer to the net) 298 *Inbound (from the net to your computer) 299 *Direction 300 *Select ethernet type 301 *Language options: 302 *Ethernet Type 303 *Finish rule setup. 304 *Step 1: Specify a &name for this rule 305 *Step 2: describe the purpose of the rule 306 *Step 3: Setup rule options 307 *This rule is active 308 *Step 4: &Review rule (click an underlined value to edit) 309 *ICMP Code 310 *Set Condition 311 *Set Condition 312 *ICMP Type 313 *Type 314 *Match Address 315 *Match Range 316 *Use Mask 317 *Use my Address 318 *Condition 319 *Sub Type: 320 *Start: 321 *End: 322 *Type 323 *Match Address 324 *Match Range 325 *Use Mask 326 *Use my Address 327 *Condition 328 *Sub Type: 329 *Start: 330 *End: 331 *Example: 332 *Select Protocol 333 *Create New Rule 334 *Select Protocol 335 *Services 336 *Type 337 *Match Port 338 *Match Range 339 *Condition 340 *Sub Type: 341 *Start: 342 *End: 343 *Match TCP or UDP port 344 *Next > 345 *< Back 346 *Finish 348 *N/A 349 *Unknown 351 *Port Dest 352 *Src 353 *Type 354 *Code 355 *Data 356 *Protocol 357 *IP Fragment 358 *Offset 359 *Type Ethernet 360 *Application no longer exists at this location 361 *Adapters 362 *Prompt to confirm changing an applications allow/block status 363 *Allows you to configure and control certain aspects of the firewall. 364 *Automatically allow known applications 365 *Allows you to set the zone for the available network adapters on your computer. 366 *Adapters 367 *Zone 368 *Internet 369 *Trusted 370 *Traffic Information 372 *Packets blocked: 373 *Bytes blocked: 374 *Total packets: 375 *Total bytes: 376 *Rule's Name 377 *Direction 378 *Ethernet 379 *Application 380 *IP 381 *Source Address 382 *Destination Address 383 *Type 384 *Name: 385 *Protocol 386 *Length 387 *Identification 388 *DF MF 389 *Frag. Offset 390 *Time To Live 391 *Source Port 392 *Destination Port 393 *U A P R S F 394 *Data 395 *ICMP 396 *Code 397 *Data( 4th to 15th byte) 398 *Packet's Content 399 *Export... 400 *Allow all traffic 401 *Are you sure you want to change the permission of this application? 402 *Yes 403 *No 404 *Do not show this dialog again 405 *This action cannot be done as the Firewall service is not currently running. 406 *Path: 407 *Some of the firewall initialization files have been tampered by an external source. These files have been restored to provide maximum security for your system. You are advised to run an Anti-Spyware product to make sure your system is clean from malware. 408 *PC Tools Firewall Plus Information 409 *Show Files >> 410 *RLS (Rulesets, *.rls)|*.rls|| 411 *Sent 412 *Received 413 *Internet Zone 414 *Trusted Zone 415 *Some of the rules you are importing conflicts with your current rules. \nTwo rules conflict when they have the same conditions but not the same action (block/allow), do you want to resolve? 416 *Rules imported successfully 417 *Failed to load rulset file 418 *Rules exported successfully 419 *Failed to save rulset 420 *Remember this setting 421 *Firewall options: 422 *Check for updates automatically 423 *Reset Traffic Details 424 *Direction: \nBlue arrow: Outbound \nGreen arrow: Inbound 425 *<< Hide Files 426 *ID 427 *Action 428 *Logged Item Action Type (Allow/Block) 429 *Type 431 *Application Path 432 *Application Details 433 *Add Rule 434 *Rule Added 435 *1 : Destination Unreachable 436 *0 : no route to destination 437 *1 : communication with destination administratively prohibited 438 *2 : beyond scope of source address 439 *3 : address unreachable 440 *4 : port unreachable 441 *5 : source address failed ingress/egress policy 442 *6 : reject route to destination 443 *2 : Packet Too Big 444 *3 : Time Exceeded 445 *0 : hop limit exceeded in transit 446 *1 : fragment reassembly time exceeded 447 *4 : Parameter Problem 448 *0 : erroneous header field encountered 449 *1 : unrecognized Next Header type encountered 450 *2 : unrecognized IPv6 option encountered 451 *128 : Echo Request 452 *129 : Echo Reply 453 *130 : Multicast Listener Query 454 *131 : Multicast Listener Report 455 *132 : Multicast Listener Done 456 *133 : Router Solicitation 457 *134 : Router Advertisement 458 *135 : Neighbor Solicitation 459 *136 : Neighbor Advertisement 460 *137 : Redirect Message 461 *138 : Router Renumbering 462 *0 : Router Renumbering Command 463 *1 : Router Renumbering Result 464 *255 : Sequence Number Reset 465 *139 : ICMP Node Information Query 466 *140 : ICMP Node Information Response 467 *0 : A successful reply 468 *1 : The Responder refuses to supply the answer 469 *2 : The Qtype of the Query is unknown to the Responder 470 *141 : Inverse Neighbor Discovery Solicitation Message 471 *142 : Inverse Neighbor Discovery Advertisement Message 472 *143 : Version 2 Multicast Listener Report 473 *144 : Home Agent Address Discovery Request Message 474 *145 : Home Agent Address Discovery Reply Message 475 *146 : Mobile Prefix Solicitation 476 *147 : Mobile Prefix Advertisement 477 *148 : Certification Path Solicitation Message 478 *149 : Certification Path Advertisement Message 479 *151 : Multicast Router Advertisement 480 *152 : Multicast Router Solicitation 481 *153 : Multicast Router Termination 482 *IPv6 483 *Source Address 484 *Destination Address 485 *Length 486 *Protocol 487 *Next Header 488 *Hop Limit 489 *Traffic Class 490 *Flow Label 491 *ICMPv6 492 *Shows the current network traffic and firewall activity. 493 *Manage the applications that are allowed to access the network. 494 *Manage advanced rules to allow or block network traffic. 495 *Shows the history of network traffic and firewall activity. 496 *Use this category to customize general settings, including tray options, white list and filtering options 497 *Use this category to set the zone for the available network adapters on your computer. To modify a zone, select the adapter name and change the zone. 498 *General Settings 499 *Bad Ethernet address format.\nExample of correct address : 00:40:ff:ff:80:11\nInsert ':' between the 6 hexadecimal numbers ranging between 00 and FF 500 *Change local ethernet address 501 *Change remote ethernet address 502 *Ehernet Address 504 *Local ethernet address 505 *Remote ethernet address 506 *Condition 507 *Ethernet Address Criteria 508 *ICMPv6 509 *where the local IP is equal to my address 510 *IP4 over IP6 511 *U 512 *D 513 *Customize 514 *Enable Logging 515 *Disable Logging 516 *Change action to Allow 517 *Change action to Block 518 *Common Tasks 519 *Import Rules From File ... 520 *Export Rules ... 521 *Undo changes 522 *Refresh list 523 *Selected Rule's Details 524 *Change this rule 525 *Permissions 526 *Select an application in the list to view details ... 527 *Please add an application to the list and select it to view details ... 528 *Full access 531 *Blocked 532 *Special permissions 533 *This program can establish inbound and outbound internet connections. 534 *This program alllows inbound connections.This program cannot access other programs but other computers can gain access to this program. 535 *This program can only establish outbound connections.Other computers cannot gain access to this program. 536 *No inbound or outbound connections are allowed for this program. 537 *This program has custom connection rules. Click 'Advance settings' to view and modify rules. 538 *Connecting allowed 539 *Connecting blocked 540 *Connecting permission undetermined 541 *Listening allowed 542 *Listening blocked 543 *Listening permission undetermined 544 *This condition cannot be removed from an application's advance rule. 545 *Category 546 *FQDN Name 547 *Step 1 : Setup rule options 548 *Step 2: Review rule (click an underlined value to edit) 551 *Port Settings Error 552 *Access through a child process 553 *Original port cannot be excluded from the range. 554 *Unknown Application 555 *Allows you to configure general rules for applications installed on your computer. 556 *Prompt for permissions 557 *Allows you to configure advanced rules for applications installed on your computer when connecting to the internet/network. 558 *Activate advanced rules 559 *Note : Advanced rules are available in expert user mode only. 560 *Advanced settings 561 *Change Permissions 562 *Grant full access 563 *Block access 564 *Allow connect 565 *Block connect 566 *Allow listen 567 *Block listen 568 *Where the remote address is 569 *Match Remote Address 570 *This action is not allowed as it will make the application's \npermission status fully undetermined. 571 *Use this category to set filtering and packet settings 572 *Filtering and Packet Settings 573 *Allows you to configure Filtering options and advanced packet settings. 574 *User Mode 575 *Expert user is able to see more detailed pop-ups and application custom rules. 576 *Normal User 577 *Expert User 578 *Packet and Rule Settings 579 *Enable Stateful Packet Inspection 581 *All Applications 582 *Summary 583 *Connections 584 *Disabling 'Application Filtering' will also turn off 'Generate Application Rules Automatically'. \nIn order for applications to connect to the Internet properly, 'Generate Application Rules Automatically' \nshould be turned on, unless you have defined proper Advanced Rules. \nDisabling this option is not generally recommended. \n \nDo you want to continue? 586 *Connecting 587 *Connected 588 *Disconnecting 589 *Disconnected 590 *Remote Address 591 *Status 592 *User 593 *Use this category to set the FW user settings 594 *User Settings 595 *Allows you to configure user settings. 596 *Connection Details 599 *Local IP 600 *Local Port 601 *Remote Port 602 *Applications 603 *Activity 604 *Settings 605 *Version 606 *Application Filtering 607 *Packet Filtering 608 *On 609 *Off 610 *Customize Rule 611 *Apply to all connections 613 *where the packet may be fragmented 614 *Original IP address cannot be excluded. \n Please reconfigure your settings to include the original IP address. 615 *Failed to import file 616 *Export logs... 617 *CSV (Comma delimited)(*.csv)|*.csv|| 618 *Failed to save logs 619 *Logs exported successfully 620 *Import logs... 621 *DAT (log data file)(*.dat)|*.dat|| 622 *System 623 *Apply to all listening events 624 *Remote IP 625 *Key 626 *Value Name 627 *The rule already exists. 628 *This hook monitors messages before the system sends them to the destination window procedure. 629 *This hook monitors messages after they have been processed by the destination window procedure. 630 *This hook receives notifications useful to a computer-based training (CBT) application. 631 *This hook is useful for debugging other hook procedures. 632 *This hook will be called when the application's foreground thread is about to become idle. 633 *This hook monitors messages posted to a message queue. 634 *This hook posts messages previously recorded by a WH_JOURNALRECORD hook procedure. 635 *This hook records input messages posted to the system message queue. 636 *This hook monitors keystroke messages. 637 *This hook monitors low-level keyboard input events. 638 *This hook monitors mouse messages. 639 *Enable enhanced security verification 640 *SPI Blocked 641 *This hook monitors low-level mouse input events. 642 *This hook monitors messages generated as a result of an input event in a dialog box, message box, menu, or scroll bar. 643 *This hook receives notifications useful to shell applications. 644 *This hook monitors messages generated as a result of an input event in a dialog box, message box, menu, or scroll bar. The hook procedure monitors these messages for all applications in the same desktop as the calling thread. 645 *The hook procedure is associated with all existing threads running in the same desktop as the calling thread. 646 *Process ID 647 *To allow this application to contact the Internet please choose  Allow otherwise choose  Block to restrict it. 648 *Allow application to use previous rule only if you know the application is safe. 649 *To accept incoming connections please choose  Allow otherwise choose  Block to restrict them. 650 *Only Allow this if you know the applications are safe. 651 *Only allow this if you know the application is Safe. 652 *Full connectivity 653 *Listening 654 *localhost 655 *Any IP 656 *Allows you to configure different Firewall settings. 657 *MAC Address 658 *Network Path 659 *History 660 *Network Map 661 *APP 662 *Please select an Active Application from the list to view detailed information on its activity. 663 *Enable stealth mode 664 *Rules in the Advanced Rules list take priority over stealth mode. \nAs stealth mode is currently enabled, this rule might break it. \nDo you wish to proceed? 666 *This rule cannot be disabled. \n However, turning off 'Generate Application Rules Automatically' under settings (Filtering tab) \n will cause this rule to become ineffective. 667 *Local Proxy Settings 668 *Allows you to configure local proxy settings. \nPlease enter valid local IP addresses only. 669 *Local Proxy Options 670 *Detect local proxy 671 *HTTP Proxy 672 *Use this proxy server for all protocols 673 *FTP Proxy 674 *HTTPS Proxy 675 *SOCKS Proxy 676 *Import from IE 677 *Import from Firefox 678 *Proxy 679 *You have entered invalid local IP addresses for the following items: 680 *Invalid port number 681 *Changes cannot be applied as there are some invalid data in the Firewall Proxy Settings. 682 *Local proxy information could not be retreived from the specified browser. 683 *You should enter at least one protocol IP or port. 687 *DNS Resolve 689 *Option 692 *Modify other applications 693 *Control other applications 694 *Modify and control system 695 *Modify system and Applications 697 *Process 701 *Normal Mode 702 *Quiet Mode 703 *Activate Quiet Mode 704 *PC Tools Firewall Plus includes Quiet Mode which is designed to reduce the number of alerts shown for potentially malicious actions. 705 *Would you like to activate Quiet Mode? 706 *Connect to the Internet through a child process 707 *Modify the binary of any other application 708 *Send control commands to another application 709 *Modify system behaviour 710 *Use Microsoft DNS Resolving mechanism 711 *Modify or send control commands to the system or to other applications 712 *You can change this at any time through the Settings.