Why not giving it a go and telling us how it works (since you ask). I'm sure it can help a lot others. I see you asked same question in here:
http://forum.avast.com/index.php?topic=17744.msg151305#msg151305 and it looks like you already use this firewall. Do some online tests like ShieldsUP!! is...
LINK: https://www.grc.com/x/ne.dll?bh0bkyd2 and inform us about the results. Perform all those tests, and it would be great if you can perform some other tests as well... for example, tooleaky test which can be found in here: http://tooleaky.zensoft.com
I like this Firewall and since Sygate is closing down why not? better then many i tried. Works very well with AVAST.
This is from R`s site :
http://www.r-firewall.com/R-Firewall is an effective and easy-to-use solution to secure your on-line activity. It protects a computer connected to a local network and/or to the Internet against any intrusions, attacks, trojans, spyware, and other external and internal threats. R-Firewall also filters out inappropriate Internet pages content and blocks dangerous active components you may get while browsing over the Internet or receiving e-mail massages.
Automatic configuration during setup allows you securely surf the Internet right after the software installation. Mobile users can create multiple and easily switchable configurations for specific network environments (Internet surfing at home, office local networks, or public Wi-Fi spots).
Please note! None of available firewalls can totally protect data or system files on a PC if the PC user mistakenly allows malicious programs to access the PC. To reinforce your file protection, we would recommend you to use R-Guard Data Security utility, a reliable firewall companion that extends your control over access rights to various valuable data files much beyond the standard Windows security services.
* Monitors network activity at the application and system component levels;
* Detects and blocks direct network intrusions;
* Detects and blocks network connections that malicious programs try to establish from within and outside the protected computer;
* Detects and blocks numerous types of attacks;
* Detects and blocks various dangerous active content on the Internet, such as JavaScript objects, ActiveX components, etc;
* Checks e-mail attachments for dangerous content, such as executable programs, JavaScript objects, ActiveX components, etc;
* Converts the protected computer into a "stealth" machine running invisibly to outside intruders;
* Provides detailed log information
* Detects and blocks unwanted information on the Internet, such as commercial banners, pop-up windows, and cookies;
* Blocks access to undesirable or inappropriate Web pages, specified either directly by their URLs, or by keywords;
* Automatic configuration during setup. Your computer is ready for surfing the Internet right after the installation;
* Presets for most Internet applications. No need to manually set ports, protocols, or other technical staff for each installed program;
* Multiple and easily switchable configurations that you can create for a specific network environment (for your home, for your office local network, or for a public Wi-Fi spot);
* Two types of interfaces: Simple for inexperienced users and Advanced for fine-tuning;
* An indefinite number of rules for each application;
* Low resource requirements
System requirements
An Intel-compatible platform running Windows 98/2000/XP/2003.
Email Recovery The administrative privileges under Windows 2000/XP/2003
are required during installation to install R-Firewall.
http://www.r-firewall.com/