PeerBlock lets you control who your computer 'talks to' on the Internet. By selecting appropriate lists of 'known bad' computers, you can block communication with advertising or spyware oriented servers, computers monitoring your p2p activities, computers which have been 'hacked', even entire. PeerBlock is a new version (aka a fork) of the popular PeerGuardian 2 software. It blocks known bad computers from accessing yours, for example governments, corporate entities, and those flagged for anti-p2p activities. PeerGuardian 1.8.0 - Security tool for P2P clients. Download the latest versions of the best Mac apps at safe and trusted MacUpdate. Download Warcraft 3 Reign Of Chaos Mac there. Download PeerBlock for free. Blocks 'known bad' IP-addresses from accessing your machine, especially corporate/governmental agencies. This is a fork of PeerGuardian 2, fixing various Vista/Win7 problems. PeerBlock for Mac OS X, download best alternative solutions carefully chosen by our editors and user community.
PeerBlock Alternatives for Mac and Linux >PeerBlock Alternatives for Mac Users: PEERGUARDIAN OSX: At last Peerguardian for MAC is still working: SNAPSHOTS PEERGUARDIAN MAC OSX: OTHERS: WATEROOF: See at right corner IPFW Rule, option to import rules. LITTLESNITCH: Also Littlesnitch got a rule like that: Rules can cover a list of multiple hostnames, domains or arbitrary IP address ranges, helping you to simplify your ruleset. ICEFLOOR: Positive comments on Icefloor is a current alternative to the outdated (yet still functionable) PeerGuardian if you are using OS X. It is a frontend for the pf firewall/packet filter, which is meant replace ipfw (which PG uses) in newer versions of OS X. The programmer of Icefloor is working on a new software that also supports OS x 10.10 and superior. However, in Icefloor, ip lists can only be loaded from files, not via the web. FIGURE L and FIGURE O A similar grid exists for listing connections established by applications, connected hosts, or sockets actively listening for communications.
Grid lists information for each connection made by an app, protocol, source, and target IPs, plus the ports they’re connected to/from, and current status (Figure O). For additional security, you can terminate connections at will from the list or ban IP addresses to prevent future connections from taking place. Such information, available at a glance, includes packet loss bandwidth — both incoming and outgoing. Whitelisted or blacklisted IPs, with relevant details in transmission rates for those connections, is also included. Lastly, the Network Services List button details many common and not so common services for both UNIX and OS X.
This information is quite helpful when troubleshooting an issue with a rule that needs to be modified due to incorrect port assignments or to prevent clashing with another offered service MURUS FIREWALL: They own an option to import blacklists. Alternative Methods: ________________Apple PF Control: -T command [address ] Specify the command (may be abbreviated) to apply to the table. Commands include: -T kill Kill a table. -T flush Flush all addresses of a table. -T add Add one or more addresses in a table. Automatically create a nonexisting table. -T delete Delete one or more addresses from a table.
-T expire number Delete addresses which had their statistics cleared more than number seconds ago. For entries which have never had their statistics cleared, number refers to the time they were added to the table. -T replace Replace the addresses of the table. Automatically create a nonexisting table. -T show Show the content (addresses) of a table. -T test Test if the given addresses match a table. -T zero Clear all the statistics of a table.
-T load Load only the table definitions from pf.conf(5). This is used in conjunction with the -f flag, as in: ——————————————————————- Here another way: Create a file called: /Library/Server/Mail/Config/postfix/client_access Add your IPs to client_access in the following format: 18.104.22.168 REJECT Add as many single IPs or IP blocks as needed.