Keep an eye on Internet connections from all applications as to expose the hidden connections. Prevent them from sending data without your consent, hence avoiding information leakage.
Manage disk access so dubious programs cannot obtain confidential information. Avert permanent changes or data loss by prohibitting disk writing. Prevent viruses and other malware infiltration.
Specify which applications should be trusted with specific operations. The flexible configuration enables the smooth running of your activities while maintaining top security.
Hands Off! is an application to monitor and control the access of applications to your network and disks. Being able to monitor the normally unnoticeable activities enables you to make informed decisions regarding the transfer of your private information, hence avoiding confidential information leakage.
When connected to the Internet, applications can send any information stored on your computer to whoever they want without you ever knowing. Using Hands Off!, you can monitor and control Internet connections from all applications as to expose hidden connections and prevent them from sending data or phoning home without your consent.
Applications present on your computer can freely read, store or erase information on your computer without your knowledge. Using Hands Off!, you can monitor and control disk access from all applications as to prevent them from obtaining confidential information, erasing your data or storing cookies.
The best way to find out if Hands Off! suits your needs is to download the latest version and try the demonstration mode. Also, make sure you read the Hands Off! tutorial to learn about all the amazing features.
Hands Off! has many advanced features which make it much more secure and trustworthy than its competition. The following comparative chart easily shows how Hands Off! rates better than its competition.
Features |
Hands Off! |
Little Snitch |
Network security |
||
Prevents applications from phoning home | ✓ | ✓ |
Blocks outgoing network connections | ✓ | ✓ |
Blocks incoming network connections | ✓ | ✕ |
Blocks domain name resolving | ✓ | ✕ |
Easily blocks multiple subdomains | ✓ | ✕ |
Protects from trojans, worms and network parasites | ✓ | ✓ |
Supports IPv4, IPv6 and local networks | ✓ | ✓ |
File security |
||
Prevents applications from reading your files | ✓ | ✕ |
Prevents applications from storing cookies | ✓ | ✕ |
Blocks read and write file operations | ✓ | ✕ |
General |
||
Flexible configuration | ✓ | ✓ |
via rules for applications communicating through Unix tools | ✓ | ✓ |
Detailed information in notifications | ✓ | ✓ |
Notifications with simple keyboard control | ✓ | ✓ |
Global rules applicable to all users | ✓ | ✓ |
Privacy in multi-user environment | ✓ | ✕ |
Instant protection after installation | ✓ | ✕ |
Checks if an update is available | ✓ | ✕ |