Use rising IE to prevent webpage Trojans

Source: Internet
Author: User

The "Internet Security Assistant" provided the "Internet Explorer" function. The following describes the problems that can be solved in detail.

I. "Internet Explorer Wall Leakage Prevention" mainly deals with the following problems:

1. When a website or webpage is infected with Trojans, the website can be effectively blocked to protect system security.

In the current network environment, the number of websites that have been attacked by hackers and implanted with viruses has increased. The number of users infected with viruses and rogue software has increased significantly compared with the previous one. Viruses implanted by hackers on webpages are mainly Trojans and Trojans, especially trojan-downloader programs.

The main function of the Trojan downloader is to secretly download viruses and rogue software in the background after the antivirus software is scanned and killed. Even if a user's computer is infected with only one downloader, hundreds of viruses and rogue software may be downloaded to the computer, making it difficult to prevent. This method is called "Trojan ". In addition, there is no installation prompt during the installation of the Trojan or Trojan file. In this way, the user cannot block the access, but with the "Internet Explorer wall", the user can clearly understand all this, so as to effectively block and filter.

2. It blocks Viruses Infected with the IE vulnerability.

The "IE Leak Prevention Wall" mainly protects and monitors various IE vulnerabilities, and blocks and prompts programs that access and use these vulnerabilities, in this way, users no longer have to worry about using the IE vulnerability to infect their computers.

3. Blocks automatically installed controls provided by websites, forums, chat rooms, etc.

When users access some web pages or enter some games or chat rooms, sometimes they find that some controls are directly installed without prompt. In many cases, these pages are accidentally clicked by the user, or the user just wants to see them and does not intend to stay for a long time. In this way, direct installation will occupy system resources and impede normal use of users. Especially when the user's computer is not configured properly, the automatically installed software will prevent other operations on the user's computer for a short period of time, including canceling the installation.

In another case, the website provides very small controls and quick installation. Even if you do not want to install them, the installation is completed before the user processes them. This occupies system resources. However, it is very troublesome to search for such controls. Users familiar with computers need to be identified and deleted, or some other tools need to be used for uninstallation.

In the above two cases, as long as your computer is equipped with an Internet Explorer wall, you don't have to worry about it any more. To detect that the installation process is blocked when the browser wants to run the program, the user is prompted that the user can choose to allow or block the user as needed.

The above are some of the main and practical functions of the IE Wall Leakage Prevention I have discovered. Of course, there may be other functions. This requires the netizens to experience it slowly.

II. The following describes how to use the IE wall to prevent leakage.

The "IE anti-leak wall" technology was developed exclusively by rising and applied to version 2007 of the anti-virus software. Rogue software, Trojans, and viruses attempt to generate alerts and block intrusions from computers by using the IE vulnerability, and fundamentally address the persistent problem that has plagued global computer security. To protect more people's computers from the intrusion of Internet Explorer vulnerabilities, the "Rising Star Card netx Security Assistant" was upgraded to version 3.1 and added the "Internet Explorer wall protection" function module. The "IE leak-proof wall" function in rising Kaka 3.1 is compatible with all anti-virus software brands and works with it to provide comprehensive security protection for users' computers.

The following describes how to use the 3.1 version of the "Rising Star Card/card/Net Security Assistant". All later versions are applicable.

After the Internet assistant version 3.1 is installed, the IE wall leakage prevention function is automatically enabled, and the icon of the IE Wall Leakage Prevention is displayed in the tray area in the lower right corner of the screen.

When a suspicious program attempts to automatically execute the program through a browser, the rising Kaka 3.1 dialog box is displayed, showing the path of the program and asking about the processing method of the Program (1 ). You can select block to disable automatic execution of malicious programs, or select allow to allow normal programs.

Figure 1

When you open a webpage normally, a pop-up message pops up on the IE anti-leakage wall prompting the browser to try to run the program. This is probably because of a website with viruses, Trojans, and rogue software, we recommend that you click "Block.

Enable and disable Internet Explorer

Open Rising Kaka 3.1 and click the IE wall icon in the upper right corner. A setting window is displayed (2 ).

Figure 2

Enable: indicates that the IE wall is currently open. After the user restarts the computer, the IE Leakage Prevention Wall still takes effect.

[Pause] indicates that the IE leak prevention wall is temporarily closed. When the user restarts the computer, the IE leak prevention wall will be reopened.

[Stop] indicates that the IE leak prevention wall is disabled. The current status is disabled. After the user restarts the computer, the IE leak prevention wall will not be restarted.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.