Every day we offer FREE licensed software you’d have to buy otherwise.

SterJo Portable Firewall Pro 2.8 Giveaway
$19.95
EXPIRED

Giveaway of the day — SterJo Portable Firewall Pro 2.8

SterJo Portable Firewall is the easiest and most convenient firewall software you could ever have.
$19.95 EXPIRED
User rating: 262 67 comments

SterJo Portable Firewall Pro 2.8 was available as a giveaway on April 24, 2012!

Today Giveaway of the Day
$49.95
free today
Helps you get back all kinds of lost or deleted data on Android devices.

SterJo Portable Firewall is innovative security program designed to prevent intruders from accessing your network even if it is run from a USB drive. This way you protect your computer from any kind of unauthorized access that could damage your system.

SterJo Portable Firewall is a very convenient way of keeping your PC from any hacks or breaches even without installing the software. Just run it on your PC or laptop and you are ready to go. The unit serves as the single entry point to your network and evaluate connections requests as they are received comparing them with each rule in the policy. This is advanced easy-to-use software with ability to watch for all ports on your system and block them if necessary.

SterJo Portable Firewall is the easiest and most convenient firewall software you could ever have. Experience the comfort it offers and enjoy surfing the net without having to worry about anything!

System Requirements:

Windows XP/ Vista/ 7

Publisher:

SterJo Software

Homepage:

http://www.sterjosoft.com/portable-firewall.html

File Size:

1.86 MB

Price:

$19.95

GIVEAWAY download basket

Developed by Informer Technologies, Inc.
Heal up your system and speed up your PC with the help of 25.
Developed by IObit
Developed by OmicronLab

Comments on SterJo Portable Firewall Pro 2.8

Thank you for voting!
Please add a comment explaining the reason behind your vote.
#67

Looks like a Chinese copy of Partition Magic.

FOR ADVANCED USERS ONLY........You can rename mfc80.dll, mfc80u.dll, mfcm80.dll, mfcmu80.dll, msvcm80.dll, and msvcp80.dll

Example msvcm80.dll

Run the executable and verify it runs OK.

To remove rge popup window, you cam use Reshacker to delete dialog 885. You need to delete pa-gotd.html two times for it to disappear

Reply   |   Comment by reghacker  –  11 years ago  –  Did you find this comment useful? yes | no (-1)
#66

Unfortunately, the program isn't compatible on Windows XP Home SP3 German with Magnifier (german: Bildschirmlupe) (Magnify.exe) (Start-> All Programs-> Accessories-> Accessibility) (if path not correctly translated, german: Start->Alle Programme->Zubehör->Eingabehilfen) for visually impaired users. If the firewall will start crashes both programs. The manufacturer should urgently repair this program to make it really Windows compatible.

Reply   |   Comment by Wurkupumpel  –  11 years ago  –  Did you find this comment useful? yes | no (+1)
#65

Ay, ay, ay, yet another Old VB app. The old VB runtimes are incredibly inefficient, and more than likely insecure. Better to write C/C++ programs that's actually portable across systems and platforms.

The installer installs a shared DLL (COMCTL32.OCX), which clearly is not a portable app practice.

(BTW, where do people even buy the old versions of VB? I'm guessing the only versions you can get these days are the .NET versions.)

Reply   |   Comment by GMMan  –  11 years ago  –  Did you find this comment useful? yes | no (-2)
#64

Thanks, i'll try it!

Reply   |   Comment by casey-908  –  11 years ago  –  Did you find this comment useful? yes | no (-4)
#63

Honestly I don't approve degrading the software products especially from people who have not tried it. My advice to you would be TRY IT and if you don't like it then delete it. You might be very impressed with this product if you know what you are doing and ALWAYS respect the effort of developers who want to give something for free. If you want to criticize then do a constructive critics and don't show your personal frustrations for something that others don't deserve.
Respect to GOTD and all small independent developers!

Reply   |   Comment by macolf  –  11 years ago  –  Did you find this comment useful? yes | no (+1)
#62

Glen #44
Certainly 10 years ago VB was deemed one of the most difficult languages to hack, in fact considered impossible by some of the best hackers.

On reading the programs web site, they appear be offering protection under certain conditions not as a substitute for normal protection, possibly better than nothing.

Reply   |   Comment by OldScotty  –  11 years ago  –  Did you find this comment useful? yes | no (+5)
#61

Few cons with this one:
~Not truly a portable program
~On list refresh it jumps the viewport to the top of the list, even when you are trying to view something somewhere else in the list
~Some of the menus are not responsive - you have to click in a certain spot for them to actually register the click event [open]
~Needs to have a config file [.ini] for a list of programs that are trusted, so that every time someone opens the program they dont have to re-trust the same apps over and over again

Sorry but I'm uninstalling this one - it would've been nice on my older pc, but if it's hard to navigate, it's not useful. Sorry.

-Robert
Windows 7 Home Premium x64 SP1
Intel Core 2 Duo T8100 @ 2.1GHz
Patriot Memory 8GB DDR2 @ 400MHz
-
Windows XP Professional x86 SP3
Mobile Intel Pentium IV @ 1.7GHz
256 MB DDR @ 100MHz

Reply   |   Comment by Robert  –  11 years ago  –  Did you find this comment useful? yes | no (+10)
#60

Thanks Sterjo and GAOTD , I'm going to give this a try despite all of the negative comments and give the Software a chance to speak for itself .

Reply   |   Comment by Ozzman62  –  11 years ago  –  Did you find this comment useful? yes | no (0)
#59

Not too easy to decide the usefulness of this tool. One face is:

+ nice to have it allmost fully portable
+ enough for most occasionally session on foreign computers (to be maintained)
+ very(!) small
+ easily shows up some useful information

BUT the other face:

- Did no one realize(?!), that this firewall can EASILY be kicked out of memory? - even the windows taskmanager can do!
(this means, you might not even realize when this watchdog has fallen asleep - which might be more dangerous than having no firewall...)
- very litte configurable
- is often NOT able to terminate processes whilst showing up and offering to do so...

This is not the protection I would trust and would like to have.

Aanyway: for now I will keep it and decide later.

Reply   |   Comment by walter  –  11 years ago  –  Did you find this comment useful? yes | no (+12)
#58

Win Xp SP 3.

Installed ok . Passed grc.com shields up test with flying colours, full stealth.

I have tried lots of other firewalls in the past. Years ago I used to swear by Zone Alarm , then they upgraded it one day and it was nothing but trouble. Tried Comodo and that was just as bad.

What you need is something that is not bloated , that just does the job and asks you when something requires permission. So far Sterjo ticks all the boxes , I would recommend downloading it now and well worth trying it out.

I suggest Sterjo install a feed back button or suggestion box within the prog itself .

Reply   |   Comment by Peter B  –  11 years ago  –  Did you find this comment useful? yes | no (+3)
#57

XP SP3
v2.8

CHM Help file

program is essentially one file, 700 KB, plus a couple "rules" files

as noted, requires COMCTL32.OCX, included if missing, & gets copied
into /windows/system32/

had to create a rule for cZ (chatzilla)
had to create a rule for LAN

on initial startup i'm told of two processes that want internet
access. my only option is to Trust *BOTH* or to Kill? why not
allow me to Trust one & not the other?

TRUSTED various apps: SeaMonkey, FF, Salamander (FTP)

*assume* it is better (more feedback) compared to Windows Firewall,
but the biggest issue I see is that it is up to me to know when i
should be creating a rule & how to create a rule

like it blocked some sort of NETBIOS service, like what is that &
what is it for, & ??? do i need it, not need it ??? it's presenting
raw data that many times i may not know what to do with?

Log, should have lookup functions

does a simple address accept wildcards?
like, 192.168.1.* so that i can allow my LAN?
no, i don't think so?

appears that some MICROSOFT_DS service will also be need for my LAN?

so here we are, a program that is likely to be too "raw" for most,
not enough information given for a user to make an intelligent
decision? too much for an average user to learn in order for them to
make an intelligent decision.

are there some pointers, FAQ somewhere (on the SterJo website)?

perhaps this could be used to augment another firewall (like Windows
Firewall), with this set up is a blacklist mode? but then a blacklist
is just what you do NOT want to be using. a whitelist is what you
want, but without study, not going to be easy enough for the average
user.

Reply   |   Comment by therube  –  11 years ago  –  Did you find this comment useful? yes | no (+5)
#56

to 3 'comment by Paul' – heard this one before and I have to say, I don’t quite understand what you are saying. If a product is bad, how can we leave ‘positive’ feedbacks?. If you want ‘positive’ feedbacks, how will it help the vendor developing better products? Don't understand me wrong, I appreciate the free offering, but it doesn't mean I have to bow to each one. Maybe I have mistaken the purpose of this site, the site is called ‘Giveaway of the Day’ in my book it means just that, if the purpose of the site is to let vendors have input into their products, there are many such sites, call it ‘User experience Forum’. Currently it gives plenty of new users to vendors. If the product is good, than each of us is a potential future customer (I have purchased 3 applications upgrades during the last year). If the product is bad, if there are better alternative and for free, Users voice should be heard, (especially negative feedbacks). This is the only thing that will force vendors to improvement. Peace

Reply   |   Comment by debudabu  –  11 years ago  –  Did you find this comment useful? yes | no (+14)
#55

When did "constructive" cease to mean "helpful" and come to mean "positive"?

"This costs too much" helps the developer improve his product.

How does "Thanks for the great program" help him?

Reply   |   Comment by Walt  –  11 years ago  –  Did you find this comment useful? yes | no (+8)
#54

FYI, Comodo's firewall is currently rated by Windows' Secrets as the best free firewall available. I've used it for years and had no problems with it.

I have no need for another software firewall at this time, but thanks to GAOTD for offering one to those who need it.

Reply   |   Comment by Rameumptom  –  11 years ago  –  Did you find this comment useful? yes | no (+4)
#53

#52, Carl LaFong, how do businesses exist? They make enough money to turn a profit, or they disappear. Have you actually bought anything offered here? If not, then you are just a freeloader. I've bought some offerings, I've bought competitive products based on recommendations here. I find that people who actually support developers are consistently voted down. Incidentally, I just needed to recover nearly a terabyte of data which Windows Media Center decided to delete for no good reason (after it deleted and overwrote a bunch of other files). Recuva currently has some bug which makes it incompatible with the drive in question (I also tried an earlier version). Recuva has also begun charging, although you can still use free versions. It was far too much data to risk using questionable software, so I bought some software from a developer whose products I know to be good quality, and not willing to spend much, a compromise on price and features (I tried the demo version first). Actually, I buy a fair amount of software, it's rare to find high-quality products here precisely because GOTD users are so rarely willing to purchase anything.

Reply   |   Comment by Fubar  –  11 years ago  –  Did you find this comment useful? yes | no (-4)
#52

I already have a firewall that I am satisfied with but the Sterjo Keyfinder listed above these comments is fnatastic. To bad it doesn't work on all programs

Reply   |   Comment by Arnie  –  11 years ago  –  Did you find this comment useful? yes | no (-3)
#51

@ fubar post #44:

While your posts are generally very helful and informative, your ocassional insults are distracting and unnecessary.

"...you could quit being a worthless freeloader and actually support a developer..."

Many developers voluntarily offer free versions of their programs to provide quick and easy exposure to their offerings to a larger population, and to receive (hopefully) constructive input, and to incentivise users to upgrade, among other reasons.

To refer to those that utilize such voluntarily offered free versions as "...worthless freeloaders..." devalues your otherwise informative postings.

Reply   |   Comment by Carl LaFong  –  11 years ago  –  Did you find this comment useful? yes | no (+17)
#50

@ The_Mick #37

Simple answer, The_Mick, comodo and other great appys exist ONLY because developers are constantly putting out new mousetraps. If something works why try another attempt to produce a better mousetrap? Because that is called "Innovation" and means, eventually, better.

Pause a moment, if you will, why invent a different light bulb? The one that exists is great and does the job perfectly....hmmm... then we wouldn't have or need compact fluros...great for reducing greenhouse gases, or the increasingly available LED bulbs.

Now focusing on the offer today, maybe they haven't got it just right yet, but I will take it and if I can really buy it for 1.99 I will (can't see that offer in the promo anywhere so I assume that the offer is made after dl'ing and installing.

Hell why not, you can't even buy a cheeseburger for that anymore.

Think positive - and as someone here more notorious that me often says "peace" ;

Reply   |   Comment by cableuserau  –  11 years ago  –  Did you find this comment useful? yes | no (0)
#49

I've seen some comments and sorry I have to give more brief description. People this is a portable software and the main use is when it's needed to log in from someone else PC where you are not allow to install anything. Before using your sensitive data, run the software to check the suspicious processes and monitor if any trojan/spyware might try to connect to remote host and steal your information when you open a browser for example. Make a good examination of all connections and if you believe the system is clean then log with your details, if not just close those unknown processes/trojan/spyware or just block their connection with the port or ip address. How simple that can be?!

Reply   |   Comment by macolf  –  11 years ago  –  Did you find this comment useful? yes | no (+8)
#48

I think some of you are confusing terms... this software is PORTABLE, not STEALTH.

Portable: Can be run from an external thumbdrive/directory without needing to be installed into the computer first.

Stealth: Leaves no traces on the host computer, such as directories being written in the users profile directories or leaving entries into the computer's registry.

Reply   |   Comment by VorteX  –  11 years ago  –  Did you find this comment useful? yes | no (+11)
#47

to 3Paul - You're an educator, so you should appreciate that about the only time learning happens in a human brain is when it encounters disequilibrium. "Good dog" only works on dogs. Criticisms of the programs offered here are the ONLY help they will get. Tell me how "OH I love your program" helps them to improve it? While a "you used the wrong version of VB" WILL help.
To authors: I admire anyone who tries to develop software in any already-glutted area of software, I just cannot see the logic in it; I would suggest they focus their programming skills in areas not already over-stocked. So far the MS built-in security alone in WIN7 has offered perfect protection - I peek at it every so often with several programs - so with that, plus all the free firewalls, plus all the famous paid ones, I cannot see the value in trying to market a program like this. My feedback would be sell it or retire it. Also you can consider the impression your GOTD "offer" will leave potential users with - show them old/marginal/common software and what do you think they will assume the rest of your programs are? Offer them a really powerful gem, and suddenly you are a "gem" of a company. First impressions are life/death on the Internet because there is so much of everything, if you bump into even the tiniest objection from a potential customer, you can lose them, and forever. If this is your best, where can you go with it, in such a saturated market? Small is good, but small and common will not be viewed with much marketable return.

Reply   |   Comment by promytius  –  11 years ago  –  Did you find this comment useful? yes | no (+9)
#46

@ Giovanni post #20

I disagree.

A firewall is NOT responsible for malware already present.
Its duty main is to stop malware from entering once the system connects to the Internet.

It is only a secondary duty that is accepted by many, but shirked by Microsoft, to block keyloggers etc from phoning home.

Reply   |   Comment by Alan  –  11 years ago  –  Did you find this comment useful? yes | no (-4)
#45

I would love to see DP Animation re-offered..got a new computer, but will not allow me to save and put on this one. I loved this little program.

Reply   |   Comment by patti  –  11 years ago  –  Did you find this comment useful? yes | no (-15)
#44

This software can never stop any hacks or breaches, because is running on the top of all previously loaded programs and can never see any connections already running.
It is pointless using VB as core for hack avoidance, since most of the hacks are hidden in assembly language, HTTP secondary calls, viruses, JavaScripts and so on.
This software is not aware of any other means to look for hacks but the pre programmed HTTP addresses. Any rouge HTTPS can bypass this software with ease.
Uninstalled.

Reply   |   Comment by Glen  –  11 years ago  –  Did you find this comment useful? yes | no (+10)
#43

I'm concerned from the comments so far (40 as I write this) that people will think that SterJo Portable Firewall Pro actually provides security, when it doesn't. In newer versions of Windows, Windows Firewall is much more sophisticated, and it doesn't even rate in the matousec Proactive Security Challenge. Sterjo has rules per protocol/address/port, but not by direction, and by far most importantly, not per application. If you're using 64-bit Windows, only 2 utilities pass matousec, Comodo and Agnitum Outpost. Free versions are available for both, but Outpost is up to 7.5 while the free version is only 7.1 (of course, you could quit being a worthless freeloader and actually support a developer). Comodo offers support for only $5 per year. "But, if we provide worthless comments, the developer might turn this into something useful someday!" R-i-g-h-t. While you can't always compare code sizes, in this case you can. After removing the GOTD wrapper, SterJo will be less than a megabyte. Outpost Security Suite is 126 MB, and while some very small portion of that will be language files, most of it is solid code, not different versions or ISO files like some products.

The "non-existent" vote manipulator will vote this comment down all day. "I'm Mr. Super-Genius and it would take a quantum physicist to manipulate GOTD votes." If you can't figure out a half-dozen ways to do it super easily, then you don't know anything about the Internet. Not obsessed with me? Our resident psychopath went totally bonkers when I posted comments during the Genie Timeline giveaway. This has been going on for nearly a year, and I've warned and warned and warned GOTD that if they don't get the voting under control, I'll do it myself.

Reply   |   Comment by Fubar  –  11 years ago  –  Did you find this comment useful? yes | no (+9)
#42

A firewall needs to be something you can set and forget, i.e. that you can depend on to keep out intruders without messing up the programs you are trying to run on your computer. It appears from some of the above comments that this software fails the test and thus cannot be trusted. I'm not about to run it myself and risk the sort of problems described above, so all I can say is use it at your own risk. It seems apparent that the developer still has some heavy lifting to do on this particular piece of bits and bytes, so at the risk of repeating myself, I recommend against turning it loose on any computer that you cannot afford to have messed up, a/k/a a "production" computer. Maybe some brave souls with "test" computers will evaluate future versions.

Reply   |   Comment by internetexplorer  –  11 years ago  –  Did you find this comment useful? yes | no (+1)
#41

"Run-time error 13′. Type mismatch" is a programming error.
It typically means you are using a numerical set of characters where an alpha should be, or the reverse. Meaning you used the wrong format.

Hopefully the developers will see those comments and be able to re-write some of the code to resolve it, if they realize the criteria that creates it. But that would usually mean a patch or the release of a new version. Seems it doesn't happen in every case though, from what we see here in the comments.

Eventually we all may.

Reply   |   Comment by Cosmo  –  11 years ago  –  Did you find this comment useful? yes | no (+7)
#40

I wouldn't use SterJo as my only line of defence. I also have a Network Router which is plenty good enough - so I haven't got stuff from outside coming into my network (uninvited), as the router works as a proper hardware firewall. So effectively everything on the inner side of my network (this side of the router) is clear from outside attacks (The modem/router blocks stuff). What I don't have is a quick and simple ad-hoc firewall I can run on my PC when testing new software that can block outgoing traffic from affecting other PCs on my network - or from reaching the internet.

When I'm finished - I can just close the firewall and remove the USB stick - and my PC is clean (apart from a few harmless registry keys). I can create multiple policy files and just change between them - and when I'm finished their impact on my pc is zero.

I don't have to worry about installing some large and more intrusive firewall that will remain on my PC after I'm finished.

As an adhoc (and convenient) firewall - I think SterJo will be handy to keep on my USB.

Thanks GOTD & SterJo.

Reply   |   Comment by Blake  –  11 years ago  –  Did you find this comment useful? yes | no (+10)
#39

@Paul,

This is the real world. If someone can't handle negative criticism they shouldn't be in business. If a company doesn't know what's wrong with a program they can't fix it. And many companies use GAotD to find out why their program isn't selling. Of course just being negative without giving cause doesn't do much good, but it's just as useless to be positive without reason. And those who have the biggest success are those who can deal with failure.

The two biggest ones I find tend to be a selling price that's way too high and programs that "re-invent the wheel" or produce something that's completely redundant. Often there's freeware that does the same thing or more. If someone wants to sell the software they have to do better than what someone can get for free.

And the criticism over price has nothing to do with how much someone paid to get it here but how much the market is willing to bear. Maybe the program isn't selling because the price is too high. In this case the program does something that Windows already offers (although a Windows update may be necessary) so it needs to do better than what Windows offers. There are also other free firewall programs available.

---

This program gives a bare-bones to displaying connections, similar to the display of Windows task manager. This makes it easier to find whatever programs could be causing trouble. Although it doesn't seem to show the activity level of a connection, thus it doesn't seem useful in determining what program might be hogging bandwidth. It appears to display both internal (things like TV cards) and external port activity.

Since this is a "portable" program I'm assuming it's really meant more for laptops and notepads. It also seems to be a bit less demanding on the system than other firewalls. It's one of those programs that takes time to fully assess but I'll probably keep it around for a while.

Reply   |   Comment by Patrick McNamara  –  11 years ago  –  Did you find this comment useful? yes | no (+23)
#38

I was always told that you can't use more than one firewall. Has this changed? Why do I need this?

Reply   |   Comment by Bother  –  11 years ago  –  Did you find this comment useful? yes | no (0)
#37

The program is very lightweight, fairly user friendly, provides (most) of the data I need, and seems to work very well out of the box. Since I use a router and an av, I don't really have a need for an extensive firewall so this works nicely. Once again, thanks GAOTD!

one more comment about the tone here: (If you haven't figured it out by now), MOSTLY you should ignore the comments here when deciding to try an offering. Make up your own mind.

Reply   |   Comment by miws  –  11 years ago  –  Did you find this comment useful? yes | no (+3)
#36

Thanks for the offer, but I can't imagine why this offer would be used when the world's top-rated firewall, Comodo, is free.

Reply   |   Comment by The_Mick  –  11 years ago  –  Did you find this comment useful? yes | no (0)
#35

This post contains a 'heads up' for the developer.

Regarding the MSVBVM60.DLL problem mentioned by post 6
That is (I believe) the VB6 runtime (for SP6)
The developer should be an 'old woman' like me, and try to keep things simple, and also avoid installation problems.

MS has pre-loaded the VB6 runtime into every version of Windows since Win 98 SE (Though I am unsure about Windows 8)
What the developer should have done is stuck with VB6 SP5 on his development machine, as that is the version of the VB6 runtime that MS pre-loads for everybody.

If he had done that, Post 6 would not have had a problem

Reply   |   Comment by Rob  –  11 years ago  –  Did you find this comment useful? yes | no (+11)
#34

Yea, Norton says that Brothersoft.com is a known malicious site, but some other software report the same thing. Do not know if it is or not but apparently once something gets out there it is parroted forever.

Reply   |   Comment by timmy  –  11 years ago  –  Did you find this comment useful? yes | no (-7)
#33

I didn't work for me. I installed it and it opened fine. I created a rule to allow traffic from a specific IP on all ports and made sure it was enabled and set to accept. Traffic continued to be filtered. I closed and reopened the app but it still filtered from that IP. POS.

Reply   |   Comment by Click Here to Delete your C Drive  –  11 years ago  –  Did you find this comment useful? yes | no (+6)
#32

By the time I made it to the 6th post, I decided not to download and install this software. I'm happy with my windows/nortons settings. Running Gibsons Research SheildsUp https://www.grc.com/x/ne.dll?bh0bkyd2, I'm good.

Reply   |   Comment by tc1uscg  –  11 years ago  –  Did you find this comment useful? yes | no (-8)
#31

When starting this it didn't close existing connections by for example firefox as this fitted one of the pre-approved categories which are HTTP, Secure HTTP, Windows Live Messenger, Incoming and Outgoing Mail and FTP. Giovanni makes a good point about boot time but the only time you would use a portable firewall would be on a computer that was NOT your own to install what you liked on. It would be an added measure for your own protection and not to protect the machine you were using. You probably wouldn't be worried if it left registry entries on a public machine but would need to leak test it to see how well it did the job. For home use Giovanni's choice Comodo or Online Armour are good and free.

Reply   |   Comment by Andy  –  11 years ago  –  Did you find this comment useful? yes | no (+12)
#30

Installed w/o problems on an external usb hdd attached to a Samsung notebook (1Gig mem, Win7 32bit starter Ed). At once it presented a tabbed list of configurable (allowed/blocked) connections. I assume this information was obtained from windows firewall rules; thus i did not have to bother with setting it up-this was the best part! it asked before blocking/ allowing new connections. It worked alongside SecurityKiss, a previous GOTD offer. Some portable apps will leave a registry traces-such as the HKCU:Run value some portable apps leave behind when the user chooses to have their portable app "start with windows". you DO Want the app to start with windows and BEFORE other programs that would connect to the web on star-tup. Except for Antivirus apps,these autorun apps,ie. browser,should be placed on Delayed Start by using the start>Admin_Tool>Services. Tkz for this gem of a program!

Reply   |   Comment by cRex  –  11 years ago  –  Did you find this comment useful? yes | no (+9)
#29

#6 & #8 - Theo Faraday

I have Windows XP, I'm admin on my system and it doesn't work for me. When I try to kill the process: "Run-time error ’13′. Type mismatch.". I'm disappointed because I was interested in portable firewall and thought that SterJo might be exactly what I was looking for.

Reply   |   Comment by Marcin  –  11 years ago  –  Did you find this comment useful? yes | no (+4)
#28

GAOTD & SterJo Excellent Software thank you very much .

Pros :
Already Portable
No registration hassles
Works efficiently (for me on 3 OSes at least)
Great Price.

Cons:
Uninstaller needs to be cleaner (minor point - log and history)


SterJo |Paul here's SOME of your Awards sites links (I just did the Pro):
http://www.downloadsarea.com/SterJo-Portable-Firewall-PRO/
http://www.soft82.com/download/windows/sterjo-firewall-pro-portable/
http://www.softpedia.com/get/Security/Firewall/SterJo-Portable-Firewall-PRO.shtml
http://www.brothersoft.com/sterjo-portable-firewall-pro-382803.html

Another Clean Award :
http://www.opensourcedownload.net/windows/network-internet/network-monitoring/virus-report/sterjo-portable-firewall-free/


Disclaimer: I don't work for anyone but myself.
"Thank you, *********
Your order has been successfully completed" (and I rarely buy).
9/10 cost, use, design, stability, portability.

Reply   |   Comment by IsItBroke  –  11 years ago  –  Did you find this comment useful? yes | no (+17)
#27

This is great, I had a look at it a while ago and thought it might be handy to have in my portable apps collection. I like simple firewalls that do what they're told.
I've even bought a license now, for $1.99 it's well worth it to be able to reinstall it later. Thanks Sterjo.

Reply   |   Comment by rg  –  11 years ago  –  Did you find this comment useful? yes | no (-13)
#26

# 3 said "If we work together as a team, we will draw developers towards GOTD instead of push them away."

OK I'll give this a good reveiw to help out the school...but is this better then Windows firewall?

Reply   |   Comment by Stortch  –  11 years ago  –  Did you find this comment useful? yes | no (-21)
#25

It's great that a portable firewall is being offered. I run Windows XP, but with as few installed programs as possible. I have found it very hard to find good portable security programs such as an antivirus and firewall. Ster Jo seems to work fine in initial testing. It can block both incoming and outgoing requests. It has been prompting me on each program I start wanting internet access. I think portable Ster Jo can replace my installed Comodo firewall, which has become bloated and accesses the internet too much itself. Thanks GOTD, this may be the best portable find of the year so far for me.

Reply   |   Comment by Farang  –  11 years ago  –  Did you find this comment useful? yes | no (+6)
#24

@5: I've downloaded lots of software from brothersoft.com and never had a problem. OTOH, I've had lots of problems with Norton and Symantec software.

Reply   |   Comment by Harlan  –  11 years ago  –  Did you find this comment useful? yes | no (+14)
#23

The name why this software is called PORTABLE is because it doesn't require installation. The registry thing is nothing compared to this feature and it has the configuration entries only. To be honest I've never seen such a software and so effective until know. Maybe not the best software but the best portable firewall if you can call it that way. I agree there should be a negative comments to improve this product but also there should be some positive inspiring comments for further developing. Personally I do like this software and I hope the comments here will make developers to improve it more. Thanks GOTD and SterJo Software,

Reply   |   Comment by macolf  –  11 years ago  –  Did you find this comment useful? yes | no (+20)
#22

Portable apps often write to the registry even though none of the app code does this write, Windows does it!
All of my apps are portable yet I still see them leave stuff in the registry.

Reply   |   Comment by OldScotty  –  11 years ago  –  Did you find this comment useful? yes | no (+6)
#21

I guess I need a more helpful troubleshooter before I trust leaving this firewall on.

I want to be able to see everything that's happening, including all links to internal and external targets, and then I want to right click on any item or line and cut and paste it, and then investigate it further within the program, and know what's what.

There is way too much is getting blocked or let through without the firewall helping me understand why or allowing me control it intelligently -- it's not helping me make informed decisions.

Yet.

Next version?

Reply   |   Comment by Peter Blaise  –  11 years ago  –  Did you find this comment useful? yes | no (+15)
#20

This GAOTD doesn't make sense to me....

As far as I'm concerned, a FIREWALL can do its job flawlessly only if it's able to control the network at boot time.

If a FIREWALL is PORTABLE, it means it can only be started AFTER your OS has ended loading itself, thus allowing malware to be already in your PC, fooling the PORTABLE FIREWALL, should it be present at a very low level (for instance at boot level).

In other words it's not a good idea to rely on a PORTABLE FIREWALL!!

Moreover, to make things worse, it looks like this GAOTD is just a semiportable firewall, as several register entry’s are made (see # 7).

So, as matters stand, why not use the award-winning and freeware COMODO FIREWALL??

COMODO FIREWALL outclasses in leak tests most of the professional firewalls out there, including this GAOTD of course.

It sports an impressive array of options that just commercial programs can provide for big bucks, such as the "Auto Sandbox Technology", which enables you to isolate your system from spyware and any other malicious code coming from untrusted programs.

Yes...it's amazingly FREE!!

http://www.comodo.com/home/internet-security/firewall.php

Reply   |   Comment by Giovanni  –  11 years ago  –  Did you find this comment useful? yes | no (+65)
#19

#3 - Paul.

Just to add to your post. I too have looked in on GAOTD (and more especially GGAOTD) daily, for years. On occasion I have posted, and have noticed others who have commented, on the moaning/complaining about free programs or games they otherwise wouldn't buy or even look at were they not being given here.

Like so much on the internet, rudeness seems to prevail. On forums everywhere people hide behind their screens and say just what they like in a way they wouldn't dream of saying things in a face to face situation (not that some of these people ever meet anyone outside the darkened room they inhabit).
When someone has put time and effort into producing a program -of any type- and then is kind enough to give it to you for nothing, the least that can be offered in return, is some good grace. Would you for example take a birthday present and say to the giver 'I don't like this, it's rubbish, it's poorly made, you've been ripped off" etc etc. No you wouldn't, you'd say Thank You, and not use it.
If you don't like an offering, what's wrong with being polite, offering CONSTRUCTIVE criticism, or simply not taking the offer on?
Keyboard warriors are nearly always nerdy cowards who in the real world wouldn't (for want of a better expression) 'Say boo to a goose'.

#12 - Mark.
You're bordering on the rude, not as bad as some on here, today seems OK so far in fact, but as you think it's OK to call is you see it, I will. I fail to see how 'scams' occur when no money ever changes hands. Maybe I'm missing something. I often see claims on here about people having bought things because they've seen them here first. My feeling about this is that it doesn't really happen all that often, but it makes a poster think he looks more justified in his posting. I'm wondering (like you do), whether the prompting actually cost you.

Paul. It is comforting to know that at least SOME children will be learning about positivity, politeness, and how to interact with others, before the texting and computer world of anonymity takes over and social responsibility is lost for ever.

Now. I'm expecting Yes's from polite people, and No's from the warriors.
:)

Reply   |   Comment by Mike Studyform  –  11 years ago  –  Did you find this comment useful? yes | no (+50)
#18

ToMMy wrote, "... Norton 360 blocked [ BrotherSoft ] saying that it was a known malicious site ..."

Really?

Why would $ymantec, owner of Norton, want to warn people away from a FREE software utility download site?

Hmm ...

Get real, ToMMy, BrotherSoft is FINE.

Get rid of NORTON, and you'll be fine, too!

What are you doign HERE at GOTD, home of high-value frebies, if you're willing to PAY for Norton .. unless you are only temporarily using the free trial version of Norton?

==========

I'm NOT a firewall person, but this is small and neat and lets me watch a computer in use for a while to see what's happening, i/o wise, soft of like Sysinternals let's me watch file and disk access and processes while I'm troubleshooting.

Cool.

I'll probably engage it occasionally when troubleshooting other people's computers, and when I'm installing unknown software, just to watch.

As Chauncy Gardner said, "I like to watch"!

Recommendatiopns to SterJo:

-- add a TIME column so we know WHEN access was attempted or accomplished.

-- allow us to resolve BLOCKED addresses, as it is, we can only copy the entire report line. Trick / work around: right-click to make a rule, at the rule screen, copy the IP address, close the rule without making it, paste the IP into external sniffer. For instance:

74.125.130.125 = gh-in-f125.1e100.net = http://www.google.com/talk/, why block that?

213.236.208.33 = 213.236.208.0 - 213.236.208.255 = OPERA-SOFTWARE-NET, why block that?

192.221.102.253 = LVLT-ORG-192-221 = Level 3 Communications, Inc. = is that one of my DNS resolvers, why block that?

.. and so on.

Am I losing desired function because you're blocking dialogs I expect to run for me in the background?

How can I audit your blocks to see if those were supposed to be my chosen sync sessions for my portable data?

How can I determine what programs inside my computer called them?

Ho wwould I edit Rule 12 or Rule 5 that blocked them?

The help screen on rules says nothing helpful.

-- include something like Steve Gibson's IDServe or DomainTools.com to resolve external addresses -- I had to use external tools to look-up and understand where the addresses were going. For instance, here's a few queries I self-ran using external tools:

You permitted these, why?:

184.27.221.55 = a184-27-221-55.deploy.akamaitechnologies.com

and

a184-86-109-229.deploy.akamaitechnologies.com = ?!?, see http://en.wikipedia.org/wiki/Akamai_Technologies for more

69.171.234.96 = facebook

... and so on.

-- I'd like an ACTIVITY SUMMARY by PROGRAM screen that's adjustable by my criteria. For instance, I'd like to know ONLY what software ever i/o'd, how many times per time frame, and last time, and that would be ONE LINE for each program

-- I'd like a PROGRAM SUMMARY by ACTIVITY screen that's adjustable so I cna see what ONE program did over it's session,

Thanks, GOTD and SterJo - excellent exposure here, and we'll see if I can spread the word.

Reply   |   Comment by Peter Blaise  –  11 years ago  –  Did you find this comment useful? yes | no (+27)
Add a comment

iPhone app giveaways »

 PicsBeauty: Restore Old Photos Giveaway
Welcome to Photo Of Clarity, an app dedicated to enhancing your photos.
$2.99 ➞ free today
Mathogen Giveaway
Mathogen is Kid-Friendly and Mom-Approved.
$4.99 ➞ free today
Solving Linear Equation PRO Giveaway
This app solves linear equations step by step and plots the result.
$1.99 ➞ free today
The Enchanted Books Giveaway
In this latest adventure with Uncle Henry, he has had a secret kept for many years that he now wishes to share with you.
$2.99 ➞ free today
Findit 200 pictures Giveaway
Classical Find it game, one hundred to play without getting tired. Each picture has 3 different, find the correct different add 15 sec.
$4.99 ➞ free today

Android app giveaways »

Demon Hunter: Premium Giveaway
The must try game for any real hack and slash fan who already got bored with just mindlessly smashing buttons.
$0.99 ➞ free today
Single Origin 2 Giveaway
Single Origin 2 helps you brew the perfect cup every time.
$0.99 ➞ free today
BodyQuest: Anatomy for kids Giveaway
Learn the basics of human anatomy.
$3.99 ➞ free today
Slime Legends - Survivor Giveaway
You are a slime survivor preparing to step on the path to becoming a monster slayer.
$0.19 ➞ free today
Heat Pump Calculator Giveaway
Installing heat pumps to meet your heating and cooling needs is becoming increasingly popular.
$1.49 ➞ free today