
NetGuard affords easy and developed methods to dam derive admission to to the rep – no root required.
Applications and addresses can in my knowing be allowed or denied derive admission to to your Wi-Fi and/or cell connection.
Blocking off derive admission to to the rep can serve:
• decrease your information utilization
• keep your battery
• prolong your privateness
Gains:
• Straightforward to make spend of
• No root required
• 100% open source
• No calling house
• No monitoring or analytics
• No commercials
• Actively developed and supported
• Android 5.1 and later supported
• IPv4/IPv6 TCP/UDP supported
• Tethering supported
• Optionally allow when show veil on
• Optionally block when roaming
• Optionally block system applications
• Optionally train when an application accesses the rep
• Optionally narrative network utilization per application per contend with
• Subject matter intention theme with gentle and sad theme
PRO ingredients:
• Log all outgoing visitors; search and filter derive admission to attempts; export PCAP recordsdata to analyze visitors
• Allow/block particular person addresses per application
• New application notifications; configure NetGuard straight from the notification
• Level to network stir graph in a standing bar notification
• Take from 5 further subject matters in both gentle and sad version
There may be now not this form of thing as a diverse no-root firewall offering all these ingredients.
Whereas you possess a keep a matter to or downside, you will send an electronic mail to [email protected]
Whereas you admire to serve other folks less fluent in English, you will serve translate NetGuard for your language: crowdin.com/challenge/netguard/
Whereas you admire to test new ingredients, you will participate within the test program: play.google.com/apps/checking out/ecu.faircode.netguard
All required permissions are described here: github.com/M66B/NetGuard/blob/master/FAQ.md#person-convey material-faq42
The source code is at as soon as available here: github.com/M66B/NetGuard
* Mounted excluding overlapping LAN subnets
* Mounted attempting down LAN DNS server addresses
* Including traditional DNS servers on attempting down LAN DNS servers
Procure Now