360 Privacy Protection Device Measurement

Source: Internet
Author: User

360 Privacy Protector is a small tool to detect the computer, can be installed in the computer software to violate the privacy of users of the rogue behavior of real-time exposure. 360 Privacy Protector Initially can only monitor the behavior of QQ, the current latest version has been a major upgrade, not only can monitor QQ, TM, MSN and Ali Wangwang 4 chat software, but also add to the user's privacy document key protection features, users can not only a definition of their own privacy documents, can also monitor a variety of software or Trojan virus "peek private" behavior.

1, the Chat software monitoring

Run the 360 privacy protector in the Windows7 flagship version, in the main interface can be seen software to provide two types of monitoring functions: "According to software monitoring" and "according to file monitoring", which "by software monitoring" is to QQ, TM, MSN, Ali Wangwang monitoring, "according to document Monitoring" is a definition file for monitoring. Here we first look at the results of "software monitoring". Click on the "Start Monitoring" button, then run a few of the above chat T, after a few minutes will be able to see the results of the monitoring.

After running for a period of time, in the "Tencent QQ" can be seen in a total of more than 1000 files or directories have been QQ, which involves personal privacy of 80 items, may involve personal access to privacy in the monitoring results in red m, and marked the corresponding behavior. This Chong suspicious pang behavior, including the Golden Hill secret security, 360 safe, Thunder, Jinshan Wei, can cattle kill 毐 and so on visit.

Ifli in the "Flood TM" option, hint to be visited more than 2,600 more, which may involve privacy of up to 85 items 3 specific suspicious items and roughly similar to, in addition to Kingsoft Security, 360 safe, thunder, Golden Hill Guards, can be cattle to kill, and so on outside the visit, Also includes access to Windowslivemessenger.

The results of the monitoring of MSN and Ali Wangwang show that although there are also some semantic items that have been accessed, there are no suspicious records and no user's privacy is involved.

For the monitoring result, 360 privacy protector can let the user save as the picture, the concrete operation is clicks the win7 system downloading software interface below "to save the monitoring result to the picture" button. At present, 360 privacy protection is not effective to prevent privacy is peeping, the lower right corner of the "Prevention of privacy files are ' peek '" feature has not yet been put into use, after the Click Will prompt this feature is currently in the development phase.

2, according to the document monitoring

360 Privacy Protector New Edition provides "on-piece monitoring" function, the default monitoring list includes "My Semantic files", "IE favorites", qq/tm/msn chat records, "Common net silver Pieces", "Common Software Installation directory", "Installed software list", 360 Privacy Protector Monitors The program's access to this directory of smart privacy files.

From the monitoring results, access to the privacy of the file is a lot of, such as the author tested about one hours, and here 敁 shows up to 5,000 times to visit the M privacy file operation. The following gives the specific access path and the inch, including the Thunderbolt software access to its own installation directory. The results of the monitoring do not indicate which items are suspicious, so for ordinary users, it is really difficult to identify which access is harmful to them. In fact, this function is also in the Golden Hill privacy Protector After the launch of the 360 privacy Protector hastily added this feature, at present, seems to be of little significance.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.