• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Agnitum Outpost Firewall PRO Review

March 29, 2007

Views: 7,748

[ad]

Agnitum Outpost Firewall Pro is a software based firewall I respect a lot, and used to actually use…It used to be fairly light weight, secure and had some good features the other firewalls at the time didn’t have (system file integrity checking and so on).

Outpost Firewall

But nowadays with NAT routers, the need for desktop firewalls is minimal in my opinion as very few desktops are actually exposed to the Internet with public IP addresses.

To be safe though you should use a desktop or software firewall to police outgoing connections, but then again as a savvy user, I don’t feel the need to have this ‘protection’ as I’m not about to surf some dodgy site with Internet Exploder Explorer or download and run any random executables that I see on the web or receive via E-mail.

I did use Outpost until they started using Microsoft Access database files to store the logs, within the first day of using Outpost with this new system…the database had become corrupt 3 times.

I think most of the things a software or desktop firewall protects against can be mitigated with a little education and good Anti-Virus software such as Avast! or BitDefender (both free for home users).

Outpost does have a vast array of features which I wont list here, you can read them yourself on the Outpost Features page.

It covers all of the important stuff.

Agnitum Outpost

The download is a reasonable 13mb and it’s simple enough to install, it does require a reboot however like most firewalls as they hook in deep with some system level DLLs.

After playing around with it, I’d have to say Outpost is still one of the most powerful and configurable software firewalls out there. It’s still a bit bloaty however, but I no longer have any problems with corrupted MDB files.

It also has some pretty cool anti-spyware software built in which gave my system a full sweep on first run.

It has a bunch of default rules for most common applications which allow secure operation without limiting the main functionality (MSN Messenger, Firefox, Thunderbird and so on).

All in it’s a good product and if you are in the market for a desktop/software firewall or need to recommend one I think it’s about the best you can get.

You can view flash demos of the various firewall functions here.

You can download Agnitum Outpost Firewall Pro here.

The trial is available for a 30 day period, after that it will cost $39.95 for a single computer and a year worth of updates. Full pricing information including a family package is available here.

Share
Tweet
Share
Buffer
WhatsApp
Email
0 Shares

Filed Under: Advertorial, Countermeasures, Security Software Tagged With: firewall, intrusion-detection, Security Software



Reader Interactions

Comments

  1. Jenaro Centeno says

    March 30, 2007 at 11:52 pm

    A few months ago I had this app running on my box (AMD63 3.2Ghz, !GB ram, 200 and 250 GB sata disks), until I noticed that it was becoming every day slower, so checking my procesess I found that Agnitium was the guilty one, so I just put it away even before my 1 year support contract ended.

    And now I am using only my ubuntu partition, when I need some stuff like Deplhi progrraming, I just fire up my virutal machine, know I am happy…

  2. Darknet says

    April 2, 2007 at 7:47 am

    Jenaro: Aye could be a bit of a bloater. Ubuntu really rocks, I have to say I like it a lot. Have you tried Kylix (Delphi for Linux).

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

AI-Powered Malware - The Next Evolution in Cyber Threats

AI-Powered Malware – The Next Evolution in Cyber Threats

Views: 272

Introduction Artificial Intelligence (AI) is reshaping cybersecurity on both sides of the … ...More about AI-Powered Malware – The Next Evolution in Cyber Threats

Falco - Real-Time Threat Detection for Linux and Containers

Falco – Real-Time Threat Detection for Linux and Containers

Views: 378

Security visibility inside containers, Kubernetes, and cloud workloads remains among the hardest … ...More about Falco – Real-Time Threat Detection for Linux and Containers

Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Views: 700

As threat surfaces grow and attack sophistication increases, many security teams face the same … ...More about Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

Views: 604

With more businesses running Linux in production—whether in bare metal, VMs, or containers—the need … ...More about Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

SUDO_KILLER - Auditing Sudo Configurations for Privilege Escalation Paths

SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Views: 646

sudo is a powerful utility in Unix-like systems that allows permitted users to execute commands with … ...More about SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Bantam - Advanced PHP Backdoor Management Tool For Post Exploitation

Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

Views: 487

Bantam is a lightweight post-exploitation utility written in C# that includes advanced payload … ...More about Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

Topics

  • Advertorial (28)
  • Apple (46)
  • Countermeasures (228)
  • Cryptography (82)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (431)
  • Forensics (65)
  • GenAI (3)
  • Hacker Culture (8)
  • Hacking News (230)
  • Hacking Tools (684)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (238)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (104)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (118)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (169)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker – Download brutus-aet2.zip AET2 (2,299,673)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,113)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,648)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,695)
  • Password List Download Best Word List – Most Common Passwords (933,536)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,183)
  • Hack Tools/Exploits (673,305)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,198)

Search

Recent Posts

  • AI-Powered Malware – The Next Evolution in Cyber Threats May 21, 2025
  • Falco – Real-Time Threat Detection for Linux and Containers May 19, 2025
  • Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance May 16, 2025
  • Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked) May 14, 2025
  • SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths May 12, 2025
  • Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation May 9, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy