[lt.gif] [rt.gif]
shield shield

   DDACS 2.0
Free Edition

     Protect yourself at all times!

DDACS 2.0 is released

What's New in 2.0

  • Password protection
  • Violation / examination log
  • New actions: log, prompt
  • Self-protection
  • Rules precedence
  • Pattern syntax extended
  • Improved command-line
  • Improved GUI
  • Program blocker with time
  • 64-bit support


DDACS is a Windows security product, based on several technologies and intended to complement protection of PC offered by the operating system. It enhances the user access control with process and host access control. It provides unique protection level and flexible, yet easy to access use cases. DDACS is designed to counter primarily zero-day attacks, both preventing them with access control and isolating already attacked programs. DDACS is suitable for both personal computers and servers.

Become a real administrator of your computer.


  • Rules-based firewall
  • Inbound and outbound network traffic filtering
  • Web sites blocker
  • Payload filter
  • File access filter
  • Programs blocker
  • Administrator is subject to access control checks
  • No time and resources consuming periodic operations
  • Very little resources use
  • Add, delete and remove rules at any time
  • Graphical control panel and corresponding command-line tools to use in scripts

Platforms Support

DDACS 2.0 supports 32-bit versions of Windows XP, 32 and 64-bit versions of Windows 7/8/10. There are no special system requirements, any system that can run the OS can run the DDACS.

Only IPv4 is supported in version 2.0


Block any IP, TCP, UDP, ICMP and any other IP traffic

Create aggregate rules such as "any protocol", "any port", "any program" with restricting policy and overwrite with exceptions for specific ports, programs and files

Use website blocker and payload pattern filtering for effective parental control

Log suspicious activity for further examination. Use prompt rules in order to decide on allowing or blocking files activity when it happens

Use files filter in order to protect your sensitive files from ANY access by ANY user. Including malware that you may unintentionally have run yourself

Block suspicious programs, especially the ones that respawn themselves and whose functionality is unknown

© Daniel Drubin 2017