Security Tips: Find a "Amulet" for IE browser"

Source: Internet
Author: User

At present, there are a lot of software to protect the system and IE, but almost all of them are to be protected by integrating some system settings or disabling some add-ons. However, the Internet Explorer BufferZone Security (hereinafter referred to as IEBS), which is unique today, can create a virtual "Security buffer" for IE ", any operation of the system can be performed in this "security buffer. In this way, various hacker programs, malicious code, and virus programs cannot really access your system. It is very innovative! Let's discuss with the author next!

  First try "Amulet"

After IEBZ is started, it changes the Windows Desktop to a Secure Desktop and generates a special folder named "My Secure Documents" on the Desktop. When you open the IE window, you will find a red border around the window, which indicates that IE is already running in the "security buffer. It is not just an IE window. In the pop-up file download dialog box, there is a red border around the software installation window, including the software running interface. It indicates that the software is already in the "security buffer" and it is easy to distinguish them from normal programs. Of course, if you trust a software, you can right-click the downloaded file in the resource manager and select "Release from BufferZone (released from the buffer zone)" in the pop-up menu, the software can be operated in a real Windows system.

  Extended "Amulet"

You may have discovered that, not just Internet Explorer, any Windows program can run in the "secure buffer zone. Select the software to be installed in the resource manager, right-click it, and select "Excute in BufferZone (executed in buffer zone, the software is always in the "security buffer" from installation to operation.

After running the installed program, double-click the IEBZ icon in the system tray of the taskbar to open the BufferZone Protection window, and open the Trusted Programs page (1 ), list all processes that are currently running in the process list. Select a process name and right-click "Send to BufferZone (sent to security buffer zone, you can send the process to the "security buffer" so that the process is isolated from the real Windows system, so you don't have to worry about making any modifications to the system.

  Manage "Amulet"

After many programs are run in the "security buffer zone", how can we effectively manage them? In the BufferZone Protection window, select the Summary (Summary) page to display the number of programs running in the "security buffer" (2) and the number of trustworthy programs in the system. Three Protection types and running statuses of IEBZ are listed, including Web Protection, Mail Protection, and P2P Protection ). Click the corresponding protection name to enable or disable protection. The "Running in BufferZone (run in buffer zone)" Panel lists all programs currently Running in the "secure buffer zone. Select the program icon and use the right-click menu to convert the program to normal execution, refresh the program list, prohibit the program from running, and stop the program.

The well-configured "security buffer" does not need to be easily changed. Open the "Configuration" Page and go to the General (overview) page) on the Password tab of the panel, select "Administrator password" and enter the Administrator Password. In this way, you must enter the administrator password when exiting IEBZ and using IEBZ for modification. If you want to change the buffer area frequently, you can select "Memorize password for [seconds] (Remember password)" and enter the specific time interval (in seconds ), in this way, IEBZ can automatically remember the password within the specified time, But manual input is required after the timeout (3 ).

After a long period of use, the "security buffer zone" will be crowded with software, resulting in a decline in system performance. In this case, we must clear the "security buffer". In addition to manual cleaning, we can set the number of days in the "BufferZone Maintenance" panel, the specified number of weeks and other methods enable IEBZ to automatically clean up the "secure buffer zone" on a regular basis ".

  Protect mobile devices

We can also run mobile storage devices in the "secure buffer zone" to prevent malicious programs hidden in these devices from damaging the system. Open the Executeables Policy panel and list all types of mobile devices in Removable media Policy, select a Device (such as USB disk-on-key) in the Device Type column. In the Protection Type list of Protection, you can select None (not protected ), bufferZone, Forbidden, Confidential, and other types.

  Protect important files

Programs running in the "security buffer" are mixed, and may include various illegal programs. To protect important files, you can include important files (such as various password files) put it in the My Secure Documents folder on the desktop. In addition, right-click a file or folder and choose "BufferZone/Confidential: hide from BufferZone (hidden from IEBS, in this way, programs running in the "security buffer" cannot access these hidden files. If you click "BufferZone/Forbidden: deny all access (access prohibited, the file is not accessible, and no program (including normal programs) can control the file or folder.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.