AtGuard 3.22

WRQ's AtGuard is software that runs on your PC and monitors network
traffic going in and out of your computer. Depending on how you have
AtGuard configured, it can also step in and intervene in network
connections and block data on your behalf. Specifically, it can:

· Block images (usually advertisements) that you don't want to see
· Speed up web page loading
· Block refer field and cookies to reduce the amount of targeted
advertising you receive
· Enhance your browsing privacy by blocking the User-agent and From
fields sent to the server by your browser
· Allow you to customize what is shown on web pages that you visit
often
· Prevent web pages from running Java applets, JavaScript, and
ActiveX controls to reduce the number of advertising scripts that
run and to increase your protection from potentially invasive
programs
· Stop animated GIFs from cycling endlessly, reducing cache disk
thrashing
· Keep track of various statistics as you surf the web, like how
much data you've downloaded and how many cookies you would have
sent back to web sites
· Prevent software from communicating with your computer or with
remote computers without your knowledge or permission

What's New in Version 3.22
--------------------------

Version 3.22 provides preliminary support for Windows 2000
release candidate 1 and 2 (build 2072 and build 2128). This
release resolves several problems introduced in release 3.21.

Fixes -
* Fix for crashes occurring within the NDISFILT module on
Windows 95/98.

* Blocked and permitted ICMP communications are now counted
on the Dashboard.

* Fix for the Firewall Test utility pertaining to inbound TCP
connections.

* If you have a listening TCP port and you set up a firewall rule
to block access to this port, AtGuard now blocks this communication
sooner than in previous versions. In some instances, this may help
with DSLReport scores.

* Fix for compatibility issues with some Norton SystemWorks 2000
configurations

* Fix for compatibility issues with PGPnet from PGP Freeware

* Fix for users using some multiple interface configurations where
packets were improperly sent out a particular interface