Introduction of real-time protection function of Tencent's computer butler

Source: Internet
Author: User
Tags firewall

According to the current network security situation, the computer Butler (7.0.2699 version) for your tailored three major protection system, 16-layer security protection.

The first major protection system: Internet Security

QQ Security Protection: Professional protection QQ theft Trojan intrusion, to protect the use of security QQ;

Online game security Protection: intercept the injection of Trojan horse to protect the security of the online account;

Online shopping security protection: Real time to protect you in the online shopping, to ensure payment security;

Web firewall: Intercepting horse and fraudulent websites to protect internet security;

File Download protection: Intercept the Trojan in the download file to prevent virus intrusion;

Search protection: Automatically identify risks in search results, fraudulent web sites.

The second major protection system: application of Portal protection

Desktop Icon Protection: block malicious programs tampering with desktop icons to prevent the system from being destroyed;

Camera protection: To prevent the camera from being secretly opened, to protect your privacy security;

U disk Firewall: Real-time monitoring U disk, to prevent virus through U disk infection system;

ARP protection: intercepts the LAN Trojan attack, prevents the system to be controlled.

Third-party protection system: System Bottom Protection

Process protection: To intercept the operation of malicious process to prevent the system from being destroyed;

Registry protection: Block malicious programs to modify the system registry to prevent the system from being compromised;

File System Protection: Real-time monitoring file operation to prevent virus infection system;

Drive protection: Intercept the malicious program load driver to prevent the system from being destroyed;

Vulnerability firewall: Automatic detection system of the latest loopholes, timely reminder repair;

Hacker intrusion Protection: real-time interception of hacker attacks to prevent the system from being controlled.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.