TrustPort Internet Security 2015 manual

TrustPort Internet Security 2015
7.4 · 1
PDF manual
 · 199 pages
English
manualTrustPort Internet Security 2015
68
An example of system location modification can be the editing of protected registries, running other
untrusted processes, an attempt to shut down the computer, obtaining system permission, or shutting
down system services and more.
NOTICE: The credibility of the application when asked by Application inspector must be evaluated by
the user. After blocking the operation, correct behavior of the application is still not guaranteed! We also
recommend avoiding conflicts with programs using a similar technology monitoring system, such as
firewalls of other software companies. In this case, we recommend turning Application Inspector off.
List and description of some system locations which Application Inspector protects against modification:
Protection of system registers Application inspector monitors and records all
changes to the registers listed in the table Protected locations/Registry. These
registers store sensitive information for the running of the system and to maintain
system integrity. Most malware begins infecting systems by writing to these registers.
File System Protection Application inspector monitors whether the untrusted process
tries to access files and directories that may contain crucial system information (such as
the c:\Windows or C:\Program Files, etc.). This feature protects all important system
files that are implicitly included in Windows (*.dll, *.exe, autorun.inf) as well as other
software such as Mozilla Firefox, Internet Explorer, etc. All these items are listed in the
table Protected locations/Filesystem.
Protection of processes/threads If malware or other untrusted applications will try
to access another process/thread other than itself, Application Inspector will evaluate
this behavior as considered dangerous and will warn the user that the program can be
harmful.
Protection of system services Application Inspector monitors whether there is any
modification/creation/deletion of system services by untrusted processes. Some Trojan
viruses are able to remotely connect to a system service, or create its own, by which
after rebooting the computer a malicious code is run.
Protection of system hooking Windows hooking is a feature that allows applications
such as media players, programs to extend the keyboard etc., put the executable file
(e.g. DDL) into another application. They are also often used by malware to record
keystrokes, screen capture or control legitimate applications. Application Inspector
monitors system hooking and with potentially dangerous software it can detect this
feature as harmful.
Protection from switching off the system Application Inspector monitors all
attempts of illegitimate applications to shut down/restart your computer. Malware or

Manual

View the manual for the TrustPort Internet Security 2015 here, for free. This manual comes under the category photo/video software and has been rated by 1 people with an average of a 7.4. This manual is available in the following languages: English. Do you have a question about the TrustPort Internet Security 2015 or do you need help? Ask your question here

Index

Need help?

Do you have a question about the TrustPort and is the answer not in the manual?

  • Receive updates on solutions
  • Get answers to your question

Question and answer

Number of questions: 0

TrustPort Internet Security 2015 specifications

Below you will find the product specifications and the manual specifications of the TrustPort Internet Security 2015.

General
BrandTrustPort
ModelInternet Security 2015
Productphoto/video software
LanguageEnglish
FiletypeUser manual (PDF)

Frequently Asked Questions

Can't find the answer to your question in the manual? You may find the answer to your question in the FAQs about the TrustPort Internet Security 2015 below.

Is the manual of the TrustPort Internet Security 2015 available in English?

Yes, the manual of the TrustPort Internet Security 2015 is available in English .

Is your question not listed? Ask your question here

No results