195 *2 : Redirect datagrams for the Type of Service and Network
196 *3 : Redirect datagrams for the Type of Service and Host
197 *The application is attemting to access the Internet.
199 *EXE (Executables, *.exe)|*.exe||
200 *Application already exists in the list
201 *Add Application
202 *Allow
203 *Block
205 *Location
206 *Application not available
207 *You have made changes to the settings on this page. Do you want to keep these changes?
208 *PC Tools Firewall
209 *You have made changes to the filters. Would you like to apply these changes now?
210 *All
211 *47-GRE
212 *ICMP
213 *IGMP
214 *Other
215 *50-SIPP-ESP
216 *TCP
217 *TCP or UDP
218 *UDP
219 *Change Protocol
220 *Inbound
221 *Outbound
222 *Change Direction
223 *Block
225 *Log
226 *stop processing more rules
228 *where the direction is
229 *where the local ethernet address is
230 *where the remote ethernet is
231 *where the ethernet type is
232 *where the ICMP code is
233 *where the ICMP type is
234 *where the local IP is
235 *where the local IPv6 is
236 *where the local port is
237 *where the protocol is
238 *where the remote IP is
239 *where the remote IPv6 is
240 *where the remote port is
241 *Change ICMP Type
242 *Undefined
243 *All
244 *Change ICMP Code
245 *Change local address
246 *Change remote address
247 *Equal to my address
248 *Different from my address
249 *and
250 *or
251 *Network
252 *Mask
253 *Change remote IPv6 address
254 *Change local IPv6 address
255 *Change local port
256 *Change remote port
257 *Change ethernet type
258 *Other
259 *on every packet
260 *Allow
261 *Match Local IP address
262 *Match Remote IP address
263 *End address is below than start address.
264 *Input error
265 *Same
266 *Different
267 *Address
268 *Not Mask
269 *Equals
270 *Equals or
271 *Doesn't equal
272 *Start
273 *End
274 *In Range A:B
275 *Out Range A:B
276 *Match Local TCP or UDP Port
277 *Match Remote TCP or UDP Port
278 *Does not equal and
279 *User defined service
280 *Port
281 *Match Local IPv6 address
282 *Match Remote IPv6 Address
283 *Rule should perform either allow or block action
284 *No Action
285 *Rule logic is invalid. Please modify the rule.
286 *Invalid rule
287 *OK
288 *Cancel
289 *Close
290 *What do you want done with the packet?
291 *Step 1: Select &action(s)
292 *Step 2: Edit the rule &description (click an underlined value)
293 *Which condition(s) do you want to check?
294 *Step 1: Select &condition(s)
295 *Step 2: Edit the rule &description (click an underlined value)
296 *Select communication direction
297 *Outbound (from your computer to the net)
298 *Inbound (from the net to your computer)
299 *Direction
300 *Select ethernet type
301 *Language options:
302 *Ethernet Type
303 *Finish rule setup.
304 *Step 1: Specify a &name for this rule
305 *Step 2: describe the purpose of the rule
306 *Step 3: Setup rule options
307 *This rule is active
308 *Step 4: &Review rule (click an underlined value to edit)
309 *ICMP Code
310 *Set Condition
311 *Set Condition
312 *ICMP Type
313 *Type
314 *Match Address
315 *Match Range
316 *Use Mask
317 *Use my Address
318 *Condition
319 *Sub Type:
320 *Start:
321 *End:
322 *Type
323 *Match Address
324 *Match Range
325 *Use Mask
326 *Use my Address
327 *Condition
328 *Sub Type:
329 *Start:
330 *End:
331 *Example:
332 *Select Protocol
333 *Create New Rule
334 *Select Protocol
335 *Services
336 *Type
337 *Match Port
338 *Match Range
339 *Condition
340 *Sub Type:
341 *Start:
342 *End:
343 *Match TCP or UDP port
344 *Next >
345 *< Back
346 *Finish
348 *N/A
349 *Unknown
351 *Port Dest
352 *Src
353 *Type
354 *Code
355 *Data
356 *Protocol
357 *IP Fragment
358 *Offset
359 *Type Ethernet
360 *Application no longer exists at this location
361 *Adapters
362 *Prompt to confirm changing an applications allow/block status
363 *Allows you to configure and control certain aspects of the firewall.
364 *Automatically allow known applications
365 *Allows you to set the zone for the available network adapters on your computer.
366 *Adapters
367 *Zone
368 *Internet
369 *Trusted
370 *Traffic Information
372 *Packets blocked:
373 *Bytes blocked:
374 *Total packets:
375 *Total bytes:
376 *Rule's Name
377 *Direction
378 *Ethernet
379 *Application
380 *IP
381 *Source Address
382 *Destination Address
383 *Type
384 *Name:
385 *Protocol
386 *Length
387 *Identification
388 *DF MF
389 *Frag. Offset
390 *Time To Live
391 *Source Port
392 *Destination Port
393 *U A P R S F
394 *Data
395 *ICMP
396 *Code
397 *Data( 4th to 15th byte)
398 *Packet's Content
399 *Export...
400 *Allow all traffic
401 *Are you sure you want to change the permission of this application?
402 *Yes
403 *No
404 *Do not show this dialog again
405 *This action cannot be done as the Firewall service is not currently running.
406 *Path:
407 *Some of the firewall initialization files have been tampered by an external source. These files have been restored to provide maximum security for your system. You are advised to run an Anti-Spyware product to make sure your system is clean from malware.
408 *PC Tools Firewall Plus Information
409 *Show Files >>
410 *RLS (Rulesets, *.rls)|*.rls||
411 *Sent
412 *Received
413 *Internet Zone
414 *Trusted Zone
415 *Some of the rules you are importing conflicts with your current rules.\nTwo rules conflict when they have the same conditions but not the same action (block/allow), do you want to resolve?
492 *Shows the current network traffic and firewall activity.
493 *Manage the applications that are allowed to access the network.
494 *Manage advanced rules to allow or block network traffic.
495 *Shows the history of network traffic and firewall activity.
496 *Use this category to customize general settings, including tray options, white list and filtering options
497 *Use this category to set the zone for the available network adapters on your computer. To modify a zone, select the adapter name and change the zone.
498 *General Settings
499 *Bad Ethernet address format.\nExample of correct address : 00:40:ff:ff:80:11\nInsert ':' between the 6 hexadecimal numbers ranging between 00 and FF
500 *Change local ethernet address
501 *Change remote ethernet address
502 *Ehernet Address
504 *Local ethernet address
505 *Remote ethernet address
506 *Condition
507 *Ethernet Address Criteria
508 *ICMPv6
509 *where the local IP is equal to my address
510 *IP4 over IP6
511 *U
512 *D
513 *Customize
514 *Enable Logging
515 *Disable Logging
516 *Change action to Allow
517 *Change action to Block
518 *Common Tasks
519 *Import Rules From File ...
520 *Export Rules ...
521 *Undo changes
522 *Refresh list
523 *Selected Rule's Details
524 *Change this rule
525 *Permissions
526 *Select an application in the list to view details ...
527 *Please add an application to the list and select it to view details ...
528 *Full access
531 *Blocked
532 *Special permissions
533 *This program can establish inbound and outbound internet connections.
534 *This program alllows inbound connections.This program cannot access other programs but other computers can gain access to this program.
535 *This program can only establish outbound connections.Other computers cannot gain access to this program.
536 *No inbound or outbound connections are allowed for this program.
537 *This program has custom connection rules. Click 'Advance settings' to view and modify rules.
538 *Connecting allowed
539 *Connecting blocked
540 *Connecting permission undetermined
541 *Listening allowed
542 *Listening blocked
543 *Listening permission undetermined
544 *This condition cannot be removed from an application's advance rule.
545 *Category
546 *FQDN Name
547 *Step 1 : Setup rule options
548 *Step 2: Review rule (click an underlined value to edit)
551 *Port Settings Error
552 *Access through a child process
553 *Original port cannot be excluded from the range.
554 *Unknown Application
555 *Allows you to configure general rules for applications installed on your computer.
556 *Prompt for permissions
557 *Allows you to configure advanced rules for applications installed on your computer when connecting to the internet/network.
558 *Activate advanced rules
559 *Note : Advanced rules are available in expert user mode only.
560 *Advanced settings
561 *Change Permissions
562 *Grant full access
563 *Block access
564 *Allow connect
565 *Block connect
566 *Allow listen
567 *Block listen
568 *Where the remote address is
569 *Match Remote Address
570 *This action is not allowed as it will make the application's \npermission status fully undetermined.
571 *Use this category to set filtering and packet settings
572 *Filtering and Packet Settings
573 *Allows you to configure Filtering options and advanced packet settings.
574 *User Mode
575 *Expert user is able to see more detailed pop-ups and application custom rules.
576 *Normal User
577 *Expert User
578 *Packet and Rule Settings
579 *Enable Stateful Packet Inspection
581 *All Applications
582 *Summary
583 *Connections
584 *Disabling 'Application Filtering' will also turn off 'Generate Application Rules Automatically'.\nIn order for applications to connect to the Internet properly, 'Generate Application Rules Automatically'\nshould be turned on, unless you have defined proper Advanced Rules.\nDisabling this option is not generally recommended.\n\nDo you want to continue?
586 *Connecting
587 *Connected
588 *Disconnecting
589 *Disconnected
590 *Remote Address
591 *Status
592 *User
593 *Use this category to set the FW user settings
594 *User Settings
595 *Allows you to configure user settings.
596 *Connection Details
599 *Local IP
600 *Local Port
601 *Remote Port
602 *Applications
603 *Activity
604 *Settings
605 *Version
606 *Application Filtering
607 *Packet Filtering
608 *On
609 *Off
610 *Customize Rule
611 *Apply to all connections
613 *where the packet may be fragmented
614 *Original IP address cannot be excluded.\n Please reconfigure your settings to include the original IP address.
615 *Failed to import file
616 *Export logs...
617 *CSV (Comma delimited)(*.csv)|*.csv||
618 *Failed to save logs
619 *Logs exported successfully
620 *Import logs...
621 *DAT (log data file)(*.dat)|*.dat||
622 *System
623 *Apply to all listening events
624 *Remote IP
625 *Key
626 *Value Name
627 *The rule already exists.
628 *This hook monitors messages before the system sends them to the destination window procedure.
629 *This hook monitors messages after they have been processed by the destination window procedure.
630 *This hook receives notifications useful to a computer-based training (CBT) application.
631 *This hook is useful for debugging other hook procedures.
632 *This hook will be called when the application's foreground thread is about to become idle.
633 *This hook monitors messages posted to a message queue.
634 *This hook posts messages previously recorded by a WH_JOURNALRECORD hook procedure.
635 *This hook records input messages posted to the system message queue.
642 *This hook monitors messages generated as a result of an input event in a dialog box, message box, menu, or scroll bar.
643 *This hook receives notifications useful to shell applications.
644 *This hook monitors messages generated as a result of an input event in a dialog box, message box, menu, or scroll bar. The hook procedure monitors these messages for all applications in the same desktop as the calling thread.
645 *The hook procedure is associated with all existing threads running in the same desktop as the calling thread.
646 *Process ID
647 *To allow this application to contact the Internet please choose Allow otherwise choose Block to restrict it.
648 *Allow application to use previous rule only if you know the application is safe.
650 *Only Allow this if you know the applications are safe.
651 *Only allow this if you know the application is Safe.
652 *Full connectivity
653 *Listening
654 *localhost
655 *Any IP
656 *Allows you to configure different Firewall settings.
657 *MAC Address
658 *Network Path
659 *History
660 *Network Map
661 *APP
662 *Please select an Active Application from the list to view detailed information on its activity.
663 *Enable stealth mode
664 *Rules in the Advanced Rules list take priority over stealth mode.\nAs stealth mode is currently enabled, this rule might break it.\nDo you wish to proceed?
666 *This rule cannot be disabled.\n However, turning off 'Generate Application Rules Automatically' under settings (Filtering tab)\n will cause this rule to become ineffective.
667 *Local Proxy Settings
668 *Allows you to configure local proxy settings.\nPlease enter valid local IP addresses only.
669 *Local Proxy Options
670 *Detect local proxy
671 *HTTP Proxy
672 *Use this proxy server for all protocols
673 *FTP Proxy
674 *HTTPS Proxy
675 *SOCKS Proxy
676 *Import from IE
677 *Import from Firefox
678 *Proxy
679 *You have entered invalid local IP addresses for the following items:
680 *Invalid port number
681 *Changes cannot be applied as there are some invalid data in the Firewall Proxy Settings.
682 *Local proxy information could not be retreived from the specified browser.
683 *You should enter at least one protocol IP or port.
687 *DNS Resolve
689 *Option
692 *Modify other applications
693 *Control other applications
694 *Modify and control system
695 *Modify system and Applications
697 *Process
701 *Normal Mode
702 *Quiet Mode
703 *Activate Quiet Mode
704 *PC Tools Firewall Plus includes Quiet Mode which is designed to reduce the number of alerts shown for potentially malicious actions.
705 *Would you like to activate Quiet Mode?
706 *Connect to the Internet through a child process
707 *Modify the binary of any other application
708 *Send control commands to another application
709 *Modify system behaviour
710 *Use Microsoft DNS Resolving mechanism
711 *Modify or send control commands to the system or to other applications
712 *You can change this at any time through the Settings.