Fake technology stack
Hide the version of IIS Server and framework that you are using by masking a another server or technology stack.
Cookie & Header names
Make life miserable for those that like to penetrate your site by change your cookie
and website header names for the whole site, a single IP, or a single User. This makes scripting attacks
that much harder and use our helpers to transform the users to the new names never loosing your sites functionality.
Block sensitive data
Deny access to data based on rules like storage, location, storage method, user type and geographical location
Why adapt your application to the firewall when you can adapt the firewall to your requirements.
You have access to the interfaces and classes and you can create your own extensions.
You can access the documentation online or download the compiled help file (.chm) from here for of-line viewing.
On support.asp-waf.com you will also find getting started information in the form of sample projects and code snippets
Look who's Talking
Depending on your license look and see who is talking with your server as well as with whom is your server talking.
Depending on the license and configuration you are able to use firewall the integration modules to block suspicious incomings and outgoing communications.
The firewall can be used to "white-list" incoming and outgoing communications and you will be able to be able to early
detect penetrations to the physical server and document the communications as well as prevent damage before it is too late.
Look who's talking is available as an integrated service in the firewall as well as a standalone micro server that you can use on your server'
You can have a look at the Look who's talking - Dashboard here.