360 Security browser no longer prompts for administration

Source: Internet
Author: User

360 Security Browser has the country's largest malicious Web site, the use of malicious Web site interception technology, can automatically intercept horse, fraud, phishing and other malicious Web site. Original sandbox technology in isolation mode even if access to Trojans will not infect. In addition to its security features, 360 security browser in the speed, resource occupancy, prevent the collapse of suspended animation and other basic characteristics on the performance of the same excellent, in the functional aspects of translation, screenshots, mouse gestures, advertising filtering and other dozens of practical functions, in the appearance of elegant design, is the best design browser, has become the majority of netizens use the browser's first choice. How do I manage/turn off/Turn on the "prompt" feature of the 360 secure browser? The following:

1, select an item, click "Delete", you can never be prompted to remove the site from the list, the next time you log on to the site and you will be prompted to save the password.

2, click "Delete All", you can empty the list no longer prompt, the next time you log in to those sites and you may be prompted to save the password.

Brief introduction of traffic light interception technology

1.URL interception Layer:

Qihoo 360 is the only "search engine" of the security manufacturer, 360 security browser URL interception application of Web search technology, positioning hanging horse, fishing, fraudulent web site. This relies on the malicious Web site to intercept the way is very fast, accurate, and its resource consumption by 360 of the backend server to bear, will not bring any burden on the user's machine. In addition, 360 has 378 million users, these users can choose to monitor, report fraudulent Web pages, combined with the 360 background of intelligent analysis technology, so that 360 security browser has the most comprehensive, updated the fastest malicious Web site in the security industry

2. Malicious script interception layer:

Assuming that the URL blocking layer is breached, 360 secure browsers can also intercept malicious scripts in the Web page without affecting the content of the user browsing the web.

3. Download interception layer:

If the hacker developed a new type of vulnerability attack, 360 security browser also implemented a comprehensive blockade of Trojan server, so that the Trojan can not download to the user's computer.

4. Process interception Layer:

The

above 3 layers of interception as the mainstream anti-horse software working principle, in theory, hackers still have the possibility of bypassing interception. However, the 360 security browser has specifically innovated the process of intercepting the Trojan Horse by its features, and all programs silently downloaded through the browser will be blocked by 360 security browser prompts before running.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.