Like every other website on the planet, SmallNetBuilder uses cookies. Our cookies track login status, but we only allow admins to log in anyway, so those don't apply to you. Any other cookies you pick up during your visit come from advertisers, which we don't control.
If you continue to use the site, you agree to tolerate our use of cookies. Thank you!

Router Charts

Click for Router Charts

Router Ranker

Click for Router Ranker

NAS Charts

Click for NAS Charts

NAS Ranker

Click for NAS Ranker

More Tools

Click for More Tools

LAN & WAN Reviews

Intrusion Detection, Identity Protection

The Firewall Intrusion Detection menu controls a thin client function. When you click on this menu, a popup menu appears that asks if it is OK to kick off its thin client suite application. The Intrusion Detection app. simply watches outgoing programs and prompts (by default) you to allow them or not allow them access to the Internet. This isn't really as much "Intrusion Detection" as it is a software firewall like Win XP SP2's built-in one that caused many of my installation hassles.

It was entertaining to monitor how many programs reach out and touch the Internet... until about the 10th program. Figure 19 shows you the dialog to add or remove programs and to set permissions (allow or block) on those programs.

Firewall Intrusion Detection window

Figure 19: Firewall Intrusion Detection window

When you click on the Identity Protection menu you get an immediate prompt to start the thin client on the computer you are using. Figure 20 shows what the main screen and popup look like.

Identity Protection screen

Figure 20: Identity Protection screen (click to enlarge)

After you enter the correct password, the Identity Protection settings window opens up. On the left side of Figure 21, you add files and folders of private data, while on the right side, you add web sites that can access the private data. It appears that there is only one degree of privacy (private or not private).

Identity Protection Settings

Figure 21: Identity Protection Settings (click to enlarge)

This feature is kind of odd, since a good deal of identify theft comes from phishing and pharming exploits rather than remote sites reaching out and sucking data off of users' computers. Like many other of the DSD-150's features, this one needs further work to really be worthy of its name.

More LAN & WAN

Wi-Fi System Tools
Check out our Wi-Fi System Charts, Ranker and Finder!

Support Us!

If you like what we do and want to thank us, just buy something on Amazon. We'll get a small commission on anything you buy. Thanks!

Over In The Forums

Hi, I have an AImesh system with 2 RT-AC68U connected with cable, the first in my house the second in garage/garden. I have about 50 wifi devices conn...
Hi guys,I tried to check more info about the region selection (also in this forum), looking at the real differences in terms of power limitation and c...
I'm wondering whether this is possible to do on the AC86U router. I'm thinking about setting up a RPi that will run a proxy server with a Wireguard VP...
I have several 2.4 Ghz smart devices connected to my RT-AC86U router currently running Merlin 384.15 firmware. As repeatedly advised, I have these dev...
I need a fast vpn router for online gaming and streaming from target.

Don't Miss These

  • 1
  • 2
  • 3