|
Multi-Account Management by the Firewall
|
The firewall provides two accounts: an administrator account and a user account. A function is provided by the firewall which enables the switch between the two accounts. The administrator can execute all firewall functions, while the user cannot modify the firewall settings and rules, or to start/stop/exit the firewall. In addition, the user needs the administrator password when switching to the administrator account.
|
|
Trojan Identification Technology |
Through heuristic virus scan technology, when a program is connected to the Internet, the trojan scanner will scan the program. If the process is suspicious, the user will be alerted. This technology enhances the ability to identify suspicious programs automatically.
|
|
IE Function Call Interception |
As IE provides an open Com component call interface, it may be called by malicious programs. This function checks the program which needs to call the IE interface. If the program is detected as a malicious program, the user will be warned.
|
|
Anti-Phishing and Anti-Trojan Website
|
The website provides a set of powerful and upgradeable blacklist rules, which contain a list of websites that are illegal, highly risky and/or highly hazardous. Using the blacklist rules, any access to the listed websites will be prohibited. |
|
|
The firewall can control access to the Internet by all modules. When an application accesses the Internet, the firewall will check the authorization of the module to see if approval has been given. If not, access to the Internet will be denied. Previously, we tested applications instead of the associated DLL. The module test will now prevent trojans from injecting into normal processes to gain access to the Internet.
|
|
|