. "If the user elects to specify a customized security setting, the user can specify particular addresses from which connections should be blocked or allowed, specify certain types of connections to block or allow, and/or specify any other conditions under which connections are to be blocked or allowed." . . .