Description
Prevent your applications from setting any unauthorized outgoing Internet connections and control the usage of traffic online, so no hidden data transferring can occur. Keep some usually unnoticed operations under control, such as disk reading and writing or minor network activities performed by suspicious applications, and allow or deny them at your option.
User comments