Protowall

Protowall is a so-called " IP Blocker", a software program that prevents targeted contacts of your own PC with the IP addresses of unwanted businesses, government agencies or other organizations.

Operation

Protowall directed in the system a network driver, the software with which it is possible to control in the first place incoming and outgoing data packets. Using a ready -set black list Protowall can now decide whether the computer responds to an incoming data packet or a can happen outgoing. Knocks Protowall it to a data packet that is addressed to one of the listed IP addresses or comes from this, that package is intercepted. Communication between your own computer and an undesirable company is thus prevented.

Supported protocols

Protowall can be observed in the location the following network protocols:

IP, ICMP, TCP, UDP, HOPOPTS, IGMP, GGP, IPV4, ST, EGP, PIGP, RCCMON, NVPII, PUP ARGUS EMCON, CHAOS, MUX, MEAS, HMP, PRM, IDP, TRUNK1, TRUNK2, Leaf1, leaf2, RDP, IRTP, TP, BLT, NSP, INP, SEP 3PC, IDPR, XTP, DDP, CMTP, TPXX, IL, IPV6, SDRP, ROUTING, fRAGMENT, IDRP, RSVP, GRE, MHRP, BHA, ESP, AH, INLSP, SWIPE, NHRP, MOBILE, TLSP, SKIP, ICMPv6, NONE, DSTOPTS, AHIP, CFTP, HELLO, SATEXPAK, KRYPTOLAN, RVD, IPPC, ADFS, SATMON, VISA, IPCV, CPNX, CPHB, WSN, PVP, BRSATMON, ND, WBMON, WBEXPAK, EON, VMTP, SVMTP, VINES, TTP, IGP, DGP, TCF, IGRP, OSPFIGP, SRPC, LARP, MTP, AX.25, IPEIP, MICP, SCCSP, EtherIP, ENCAP, APES, GMTP, IPCOMP, PIM, PGM.

Background

On the Internet there are numerous companies and institutions, which spy on Internet users. Starting with the observation of the preferences of a user - to him, for example, be able to operate with targeted advertising - about creating statistics to controlling illegal activities (keyword: RIAA and MPAA ) extends the range. In order to accomplish this in a big way, leased lines are required, which have large bandwidth and have a static IP address. Thanks to this fact, it is possible to maintain lists said company by Whois query and these keep using an IP blocker or a firewall from your own computer. Firewalls are usually not designed to handle large lists of IP addresses, so it often comes here to heavy system loads, or even a crash ( where the computer is left unprotected in the worst case ). IP blocker, however, have only the task to block IPs, and can accomplish this with a mostly barely measurable system utilization.

The use of an IP blocker such as Protowall can be described as a temporary security measure. For one, it is hardly possible to make all IP addresses of identify companies and on the other they can also just as easily use dynamic IP addresses.

Bluetack

Behind Protowall is an Internet community called Bluetack Security Solutions. This community consists partly of programmers as dudez (main programmer of Protowall ) as well as from a number of volunteers, spy on the IP addresses of businesses. Bluetack among other things a series of black lists, which are divided into categories ( eg advertising, universities, government agencies, anti-piracy organizations, etc. ). Bluetack has no commercial background and is funded by donations.

Blocklist Manager

How Protowall is Blocklist Manager software from another Bluetack. It is used for processing IP lists and is among other things be able to download lists directly from Bluetack Internet portal and convert them to numerous formats ( for different programs ). Furthermore, other editing functions are offered yet. Bluetack advises to Protowall and Blocklist Manager to use combined in order to be able to ensure the IP lists are up to date.

662888
de