Toolbar Objects are applications extending Internet Explorer acting as plug-ins. If Browser Helper Objects (BHO) shield detects such an attempt, it gives you the opportunity to approve or block this action. Some spyware and browser helper objects may cause problems such as incompatibility issues or corrupt important computer functions making them not only a threat to your security but also to your computer's stability. Even though browser helper objects are used by many legitimate applications, both spyware and browser redirectors often use browser helper objects to display advertisements or gather information on your browsing activities. Internet Guard monitors applications that make unauthorized connections to the Internet or modifies your computer's Internet connection settings such as dial-up or wireless connectivity.īrowser Helper Objects (BHO) are applications extending Internet Explorer and act as plug-ins. If Hosts file shield detects such an attempt, it gives you the opportunity to approve or block this action. Some spyware applications attempt to change your hosts file to redirect your browser to a different website. Windows Host File is used to translate domain name to IP address (e. If File Extensions shield detects an attempt to change a file extension association, it gives you the opportunity to approve or block this change. Some viruses or malware may attempt to change this association causing you use another application with a different extension. g.doc, will be opened by the program associated with this extension, e.g. System INI files shield monitors additions and modifications of both Windows Win.ini and Windows system.ini file.įile Extension Association check guarantees that files with certain extensions, e. The C:\windows\system.ini file is an initialization file used with Microsoft Windows to initialize system settings for the computer such as the fonts, keyboard, language and various other settings. If this file becomes corrupt, Windows will either not load, or will have several errors as it loads. For example, the communications drivers, wallpaper, screensaver, languages, and fonts, are loaded each time win.ini is initialized. Win.ini is used to load various settings each time Windows starts. The Microsoft Windows initialization file is located at C:\windows\win.ini. System Guard monitors several important checkpoints and checks for unauthorized or hazardous changes to your computer, such as altering your security permissions or system settings.Ĭheckpoints monitored by the System Guard include the following: Here you can find the list of all applications that are considered being threats that have ever attempted to install or perform an action on your computer and you allowed or blocked their installation or another action. Services shield helps you to prevent unauthorized programs from adding themselves to Windows services. Windows services can run without any user interaction and load when the computer starts prior to a user logging in. If it is known as a spyware or other malware, Startup shield will block it and warn you.Ī service is a process or set of processes that adds functionality to Windows by providing support to other programs. In case that the program being added is marked as safe, Startup shield will allow its addition. Startup shield notifies you if a new startup program is added to any startup registry location. These keys generally apply to Windows 95, 98, ME, NT, 2000, XP, and 2003. Applications listed in any registry keys are loaded automatically when Windows starts. Startup registry keys are a number of registry entries in the Windows registry that store paths to applications on your computer. If you haven't setup the Real-Time protection in the Setup Assistant, you can do so now by clicking on the " Real-Time Protection" tab, selecting the " Use Real-time Protection" checkbox and clicking on the " Save Changes" button.Īpplication Guard monitors several important checkpoints and checks for attempts to add or modify your installed applications.Ĭheckpoints monitored by the Application Guard include the following: Go back to Help Real-time Protection Real-Time Shield Settings
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |