Asus RT-AC68U Dual-band Wireless-AC1900 Gigabit Router
Apple MacBook Pro with Retina Display (15-inch, 2014)
2015 Hyundai Genesis sedan 5.0 RWDstars
Hyundai's new luxury sedan gives us more of everything we liked about the original with...
Beats Studio Wireless Series
Norton Personal Firewall 2005
Norton Personal Firewall 2005 is easy to set up and makes your computer invisible to hackers, port sniffers, and other bad characters without any effort on your part. But at $50, it remains overpriced, given that it offers little perceptible change from last year's version and that ZoneAlarm offers comparable firewall protection for free.
Insert the Norton Personal Firewall (NPF) CD, and installation begins automatically; next, you must enter the lengthy CD key to activate the product. Some users may be wary of the activation process, but it's actually quick and doesn't require any personal information. Once you've installed the software, you should run Live Update to check for patches and updated firewall definition files.
For most everyday home users, NPF's out-of-the box default settings will work well. But moving the security slider on the Firewall tab from Medium to High will significantly tighten security. The Custom Level button on the Firewall tab lets you tweak the individual security features for each security level. Unlike, which requires you to drill down through several layers of dialog boxes, Norton conveniently keeps configuration information on the first level of the interface or only one layer down. The Firewall tab also lets you select basic settings, such as the overall security level. The Programs tab tracks each program that operates through the firewall, making it easy to locate unauthorized or unexpected software access to the Internet. The Networking tab gives you precise control over which computers on your LAN get access to files on the PC. The Locations tab allows you to customize the firewall for different environments (such as home or office). The Advanced tab lets you tweak settings for specific types of Internet traffic.