Emsa Port Blocker


License: Free to try
Downloads: 9
Op. System: Win7 x32, Win7 x64, Windows 8, WinXP, WinVista, WinVista x64, Windows2003, WinServer, Windows Server 2012, Windows 10
Last updated: 10-28-2004
File size: 329 KB
Related software:

Publisher description for Emsa Port Blocker

Emsa Port Blocker program icon

Emsa Port Blocker is a TCP blocking utility. What it does, is blocking unwanted tcp access from/to your computer.It is not a firewall, but up to some extent it could be regarded as a similar tool. Its purpose is to prohibit TCP access on certain ports and ip addresses. IT can also be used as a TCP monitor because it shows TCP connections currently active on the machine. This program works two ways. It can be configured to block access to certain local ports, but it can also prohibit access to specified remote ports as well. For example, you may try adding the port '80' to remote blocked ports. You'll immediately notice that you have disabled your browser's capability from accessing the www. You can use this program to block unauthorized access to certain ports on your computer, for example network ports like TCP 135 or 139 and so on. You can also use the configuration to permit connections between local IP's, or block even those as desired. The program comes with a function allowing to detect local ip's and adding them to the 'allowed' IP list. Functions: - When first started up, the program shows a list of TCP connections on your machine.If you don't see anything there, try opening browser and visit some site and you'll see them. - By unchecking the 'Show only connected' checkbox the program will also show tcp connections in other states, like LISTENING and so on. - The left hand list is versatile and its meaning depends on the last button clicked - check the label above to see what the list is currently displaying. - To add items to a list, type into the textbox below and click on add. Make sure you enter valid data (valid ip addresses/ valid port numbers).To delete one item, select it in the list and click on 'Delete'. - To view Allowed IP Addresses, click on the corresponding button. By default, here you will see your local IP address ( You may want to add all your local IP addresses to the allowed list.

Add your review

User reviews

Visitor: RAGNAR
General rate: Negative
Visitor: Kenneth Wade Wilson
ALL software is potentially spyware except what you write yourself and even that can probably be modified without your knowledge. This little piece of work is a whole lot quicker and cheaper than the standard fix for coping with the MS08-067 worm vulnerability just discovered in all computers worldwide. I installed port blocker, set it to block ports 139 and 445, and then i disabled the "computer browser" service and the "server" service at start>run>services.msc . I am now immune to the nastiest worm in history. It is, I wouldn't be surprised, a version of the same military worm that was used to take down Saddam Hussein's computer network just before Desert Storm. Nice little free firewall. Until, that is, some variant of that declassified worm melts my pooter.
General rate: Positive