![]() Using the log manager, the administrator can view each user's activity on the Internet. Personal filters can also be created, these contain whitelists (allowed web content) and blacklists (prohibited content). Parental Control lets you manipulate the surfing behavior and computer use for children. The spam filter uses a white and a blacklist to automatically identify which emails are trusted or not, it also uses content filtering, email text and subject analysis and takes the appropriate reaction (depending on the default or user customized settings). Spam protection fights against SPAM and unwanted advertising emails. This component checks sent and received emails and appends reports to malicious mails. It uses multiple security levels, automatically creates rules for applications and ports, detects unknown server applications, reports new unprotected networks and network attack attempts (port scans, SYN, UDP and ICMP flooding, etc.).Įmail Protection is used to keep you safe from infected email attachments, it prevents the accidentally sending of messages that contain malware. The firewall monitors the activity of the network, controls applications that try to access the Internet and prevents hacker attacks. ![]() The Webfilter engine frequently updates its databases to be able to block the newest phishing Web sites. during online banking) to fake websites to steal your personal information. Phishing Protection blocks any attempt that tries to redirect the accessed Web pages (ex. ![]() This security component scans all accessed HTTP addresses, controls the download size limit, quarantines infected downloaded objects and protects instant messaging (integrates into Microsoft Messenger and Trillian). Web Protection guarantees that you don't fall victim to fraudulent or infected websites during the browsing of the Internet. The updating of the virus signatures can be manual or automated and ensures that the computer is protected against the latest threats. The generated log files include all performed actions and can be saved to the local disk or printed. ![]() The on-demand virus scanner performs full or partial system scans (checks different areas of the operating system such as memory, registry, startup items, removable media, local disks and detects the presence of rootkits).Ī smart built-in wizard allows you to create a bootable CD, that runs automatically on system startup and checks the computer for viruses and malware (this operation doesn't require the operating system to load). This security software uses behavior and signatures-based detection methods, it checks files inside archives, email attachments, system areas, network accesses, files during writing in real time mode, manages the list of exceptions (these files will skipped during scanning), generates log reports, quarantines suspicious objects and automatically checks for new malware signatures.Īd-Aware Total Security supports scheduled operations (users can create and schedule individual tasks that launch one or both virus engines and scan different areas of the operating system on predefined dates and times) and manages the quarantined items (these can be submitted for analysis, restored or deleted). The malware scanner protects the computer against infections in real time and in on-demand mode, it uses multiple engines that work independent of each other and ensures high defense against infections and gives the very best results.ĭepending on your computer's performance, you can deactivate one or use both engines, customize the actions that are taken in case of malware detection, adjust the system components that are included in the scanning process and the way the scan engines monitor the operating system. It also enables Web and instant messenger protection, parental control, data backuping and system tuning. infections, a two-way firewall and an anti-spam engine. ![]() Protection against virus, spyware, trojans, rootkits, blended malware.Īd-Aware Total Security is an advanced security suite that includes an award winning malware scanner that can detect and clean virus, trojan, spyware, adware, etc. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |