Abstract
This research presents the Local and
Public Traffic Concrete Barrier software
(TCB) which work as a first defensive line
to the computer from any remotely or
locally attackers or intruders. The key
feature in the TCB software that it does
not depend or use the built in windows
firewall which is became week against the
new attacking techniques. The TCB
software can blocks all TCP process based
on rules that can be specified and saved
by the user such as base on Process Name,
Remote IP or Remote/Local Port. In order
to make the user rules unchangeable the
TCB is password protected software with
3 different security levels and it can also
Logs and save all the activity. Depending
on the user defined rules the TCB act like
a Virus/Spyware/Adware basic protector
that alerts the user when it s automatically
scans any Processes, IP or Port that
matches with the user preset rules. All the
above mentioned TCB capabilities and
features helps to keep the computer more
secure. As well it restricts information that
comes to the computer from other
computers,
providing more control over the data on the computer and providing a line of defense against people or programs (including viruses and worms) that attempts to connect to the computer without invitation (unsolicited request).Introductio
Public Traffic Concrete Barrier software
(TCB) which work as a first defensive line
to the computer from any remotely or
locally attackers or intruders. The key
feature in the TCB software that it does
not depend or use the built in windows
firewall which is became week against the
new attacking techniques. The TCB
software can blocks all TCP process based
on rules that can be specified and saved
by the user such as base on Process Name,
Remote IP or Remote/Local Port. In order
to make the user rules unchangeable the
TCB is password protected software with
3 different security levels and it can also
Logs and save all the activity. Depending
on the user defined rules the TCB act like
a Virus/Spyware/Adware basic protector
that alerts the user when it s automatically
scans any Processes, IP or Port that
matches with the user preset rules. All the
above mentioned TCB capabilities and
features helps to keep the computer more
secure. As well it restricts information that
comes to the computer from other
computers,
providing more control over the data on the computer and providing a line of defense against people or programs (including viruses and worms) that attempts to connect to the computer without invitation (unsolicited request).Introductio