– Two modes: site blocking and blocking downloads from the site. Its own base subject to the same rules that apply to the total base In addition to built-in database of blocked sites in the WEB-filter there is a possibility to create a list of sites that the user for whatever reason deemed malicious. Creating of the users own list of blocked sites If the site is in a list, you will be able to visit it, view a page, image, but will not be able to download files from the program files, documents and other files that could potentially pose a threat to your computer Some sites are added to the base of Zillya! Internet Security as suspicious or as sites with malicious content. Blocking of potentially dangerous content from suspicious sites An appropriate notification displayed for the user Zillya! Internet Security has the ability to block the access to potentially dangerous sites, blocking its download during review in browser. Main function of this module are: - Blocking of dangerous sites Zillya Internet Security Complete antivirus functionality Antivirus, Firewall, WEB-filter, USB-protection Minimal system resources usage Energy efficiency. So it is not necessary to create separate access rules for the server for each application. To do this it is enough to sign a rule in the settings, which allows access to the certain IP address through the certain port. For example, if user need to all applications have the access to certain server. Ability to install general settings for all system applications Zillya! Internet Security has the ability to install general settings to all applications. They can be used to allow or block network activity on such protocols even if the intricacies of their work in unknown. The program has a built-in database, which contains all the necessary rules for resolving or blocking (by the user) of the standard system services or protocols (NetBios, DHCP, DNS, etc.) during working in network. This is to protect the system from trying to access it from the outside, as any incoming requests are blocked. Protection from unauthorized external attacks Firewall permits only outbound traffic for applications by default. Control the access to network applicationsĪ firewall monitors all applications that attempt to access the network. Program has built-in application-level firewall that provides user with:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |