Like every other website on the planet, SmallNetBuilder uses cookies. Our cookies track login status, but we only allow admins to log in anyway, so those don't apply to you. Any other cookies you pick up during your visit come from advertisers, which we don't control.
If you continue to use the site, you agree to tolerate our use of cookies. Thank you!

Router Charts

Click for Router Charts

Router Ranker

Click for Router Ranker

NAS Charts

Click for NAS Charts

NAS Ranker

Click for NAS Ranker

More Tools

Click for More Tools

LAN & WAN Reviews

Intrusion Detection, Identity Protection

The Firewall Intrusion Detection menu controls a thin client function. When you click on this menu, a popup menu appears that asks if it is OK to kick off its thin client suite application. The Intrusion Detection app. simply watches outgoing programs and prompts (by default) you to allow them or not allow them access to the Internet. This isn't really as much "Intrusion Detection" as it is a software firewall like Win XP SP2's built-in one that caused many of my installation hassles.

It was entertaining to monitor how many programs reach out and touch the Internet... until about the 10th program. Figure 19 shows you the dialog to add or remove programs and to set permissions (allow or block) on those programs.

Firewall Intrusion Detection window

Figure 19: Firewall Intrusion Detection window

When you click on the Identity Protection menu you get an immediate prompt to start the thin client on the computer you are using. Figure 20 shows what the main screen and popup look like.

Identity Protection screen

Figure 20: Identity Protection screen (click to enlarge)

After you enter the correct password, the Identity Protection settings window opens up. On the left side of Figure 21, you add files and folders of private data, while on the right side, you add web sites that can access the private data. It appears that there is only one degree of privacy (private or not private).

Identity Protection Settings

Figure 21: Identity Protection Settings (click to enlarge)

This feature is kind of odd, since a good deal of identify theft comes from phishing and pharming exploits rather than remote sites reaching out and sucking data off of users' computers. Like many other of the DSD-150's features, this one needs further work to really be worthy of its name.

More LAN & WAN

Wi-Fi System Tools
Check out our Wi-Fi System Charts, Ranker and Finder!

Support Us!

If you like what we do and want to thank us, just buy something on Amazon. We'll get a small commission on anything you buy. Thanks!

Over In The Forums

Morning I rebooted my router through the ASUS ios app and now the router won't turn on. When i try turning it on using the switch at the back, the 4th...
Another speedtest site, this time from Cloudflare. Nothing fancy in their tests (no bufferbloat testing for instance), but provides an alternative (as...
Hi Guys,I just added RT-AC68U as a node to AC5300 and as i understand 5Gz-2 (2nd 5gz band) is used for AiMesh.Is there a way to dedicate 1st one to Ai...
It seems I’m having streaming issues with YouTubeTV with all my devices after upgrading to 9107Netflix doesn’t seem to be an issue.Speed tests still c...
Hi everyone,I am copying some files from my win10 pc to my synology NAS, file speeds are about a dismal 2MB/s, they used to be about 80MB/s.Is there a...

Don't Miss These

  • 1
  • 2
  • 3