Categories
Security

FEP Private Hero Security Related Security for Windows

FEP-Private Hero – make private data secure, be consisted of FProtector, Exemonitor, private firewall
FEP-Private Hero represents a Triple product software for users to make private data secure, be consisted of FProtector, Exemonitor, private firewall. Fprotector can lock or hide any number files and folders, it does not modify file system structure. Any files or folders including the root directory can be protected completely.

Exe monitor do complete control of programs that to be ran, Password for control of running program, so that no one but you can run any program on your compter. Private firewall control program access network and show you the info of ports mapping to its process.

It can find all open and active TCP and UDP ports on your computer, dynamic show the connections status and their sending and recieving data bytes, dynamic show the info of remote network ip and port. Auto prompt you the program access to the network, showing you the ip/port of the remote network, auto prompt you the program access to the network, showing you the ip/port of the remotenetwork and the information of the program.

FProtector protect any files and folder,you can hide,lock ,hide and lock them.Once the data is protected,no one can access, copy, remove them.It is easy to use,just right click the file or folder and choose your protected mode.Same as unprotecting.No limition specified.You can even protect the system folders,the program itself,no effect on your system.

ExeMonitor watching all the programs that to be ran and give you a prompt of the exact path of the program.You can select pass or deny.password protection for your selection.it can help you to find a “Trojan” and give you a complete control of all the pragrams. Other people without right password can not run any program.

PrivateFirewall is a secret firewall.You can see the open ports mapping to its program,the sending and receiving data bytes on a port,the Info of the program and the remote network.It help you to find “Trojan horse”.You can also control the network access of the program.If password is set,no one but you can access PRFW.

Limitations:

ยท 30 days evaluation period

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!