From eScan Wiki
Revision as of 07:46, 30 August 2010 WikiSysop (Talk | contribs) ← Previous diff |
Current revision WikiSysop (Talk | contribs) |
||
Line 1: | Line 1: | ||
{| class="wikitable" border="0" | {| class="wikitable" border="0" | ||
- | + | |- | |
- | {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | + | |
- | | style="width:56%; color:#000;" | | + | |
- | {| style="width:280px; border:none; background:none;" | + | |
- | | [[Image:Escan_wikipedia.jpg|left|<!--We add confidence to computing-->]] | + | |
- | |} | + | |
- | |width="1000pt" style="width:11%; font-size:95%;" white-space:nowrap;| | + | |
- | <B>General</B> | + | |
- | * [[Main Page|<font color="blue">Home</font>]] | + | |
- | * [[Marketing|<font color="blue">Marketing</font>]] | + | |
- | * [[Events|<font color="blue">Events</font>]] | + | |
- | * [[Marketing/Advertisement|<font color="blue">Advertisement</font>]] | + | |
- | |width="1000pt" style="width:11%; font-size:95%; white-space:nowrap;" | | + | |
- | <B><p> Knowledgebase</p></B> | + | |
- | * [[Technical Info|<font color="blue">Technical Information</font>]] | + | |
- | * [[Beta Testing|<font color="blue">Beta Testing</font>]] | + | |
- | * [[Release Candidate|<font color="blue">Release Candidate</font>]] | + | |
- | * [[User Guide|<font color="blue">User Guides</font>]] | + | |
- | * [[Escan/english/Technologies|<font color="blue">Technologies</font>]] | + | |
- | |width="1000pt" style="width:11%; font-size:95%;white-space:nowrap;" | | + | |
- | <B><p> Support</p></B> | + | |
- | * [[EMail|<font color="blue">eMail</font>]] | + | |
- | * [[Online Chat|<font color="blue">Online Chat</font>]] | + | |
- | * [[Telephonic Support|<font color="blue">Telephone</font>]] | + | |
- | * [[Remote Support|<font color="blue">Remote Support</font>]] | + | |
- | * [[Forums|<font color="blue">Forums</font>]] | + | |
- | |} | + | |
- | {| class="wikitable" border="0" | + | |
- | |} | + | |
- | + | ||
{| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | ||
| style="width:10%; color:#000;" | | | style="width:10%; color:#000;" | | ||
Line 35: | Line 6: | ||
| [[Image:escan-g.jpg]] | | [[Image:escan-g.jpg]] | ||
|} | |} | ||
- | |style="text-align:left;"|'''·''' [[Escan/english/eScan-Articles|<font size=1.5 color="blue" align="left">Articles</font>]] '''·''' [[Escan/english/eScan-FAQ|<font size=1.5 color="blue">FAQ</font>]] '''·''' [[Escan/english/eScan-Troubleshooting|<font size=1.5 color="blue">Troubleshooting</font>]] | + | |style="text-align:left;"|'''·''' [[Escan/english/FAQ-eScan|<font size=1.5 color="blue" |
- | |style="text-align:right;"| '''·''' [[Technical Info|<font size=1.5 color="blue">Technical Information - Main Page</font>]] | + | |
+ | align="left">eScan</font>]] '''·''' [[Escan/english/MailScan-AFT|<font size=1.5 | ||
+ | |||
+ | color="blue">MailScan</font>]] '''·''' [[Escan/english/Technologies|<font size=1.5 | ||
+ | |||
+ | color="blue">Technologies</font>]] | ||
+ | |style="text-align:right;"| '''·''' [[Technical Info|<font size=1.5 color="blue">Technical | ||
+ | |||
+ | Info</font>]] '''·''' [[Escan/english/Security_Awareness|<font size=1.5 color="blue">Security | ||
+ | |||
+ | Awareness</font>]] '''·''' [[User_Guides|<font size=1.5 color="blue">User Guides</font>]] | ||
|} | |} | ||
Line 61: | Line 42: | ||
=='''Overview'''== | =='''Overview'''== | ||
- | The MicroWorld Winsock Layer technology is a revolutionary technology that resides on the Winsock Layer of the operating system and scans all the incoming and outgoing traffic from the Internet and checks for any security violating content. If the data packet is clean it is passed or else it is removed before it reaches the application layer. | + | Anti-Virus software often come with sophisticated mechanisms for detecting and cleaning malware. In most cases, Anti-Virus software detects the presence of a malware only after the computer on which it installed is infected. MWL is a revolutionary technology from MicroWorld that is poised to change the way Anti-Virus software handle security threats. Unlike other Anti-Virus software that are currently available, it detects malware at the Winsock layer itself and prevents them from affect the applications residing at the Application Layer. |
__TOC__ | __TOC__ | ||
Line 69: | Line 50: | ||
- | '''Without MicroWorld WinSock Layer (MWL)''' | + | '''How MWL Works?''' |
- | + | ||
- | All incoming and outgoing mails, pass through the WinSock Layer at the server level and the client level. | + | |
+ | eScan primarily uses MWL to scan the incoming and outgoing network traffic. MWL is placed above the Winsock layer of the operating system. (See Figure 1. MWL Filters) All data passing through the Winsock layer has to pass through MWL. Thus, MWL acts as a transparent gatekeeper and monitors data packets for malicious content. It assembles the data packets coming from different TCP/IP ports into files based on their type into e mails, e mail attachments, or Web traffic, such as FTP traffic or ICQ traffic. It then passes the files through numerous filters, such as virus filters, content filters, and attachment filters. These filters check and issue dynamic notifications based on the validity of the content within each file. | ||
| | ||
- | [[Image:without_mwl.gif|center]] | + | [[Image:Winsock.jpg|center]] |
| | ||
- | '''With MicroWorld WinSock Layer (MWL)''' | ||
- | MWL sits on WinSock. All content passing through WinSock has to mandatorily pass through MWL, where it is checked for any security violating data. If such data occurs, it is removed and the clean data is passed on to the application. | + | __TOC__ |
+ | |||
+ | =='''Without MicroWorld WinSock Layer (MWL)'''== | ||
+ | |||
+ | All incoming and outgoing mails, pass through the WinSock Layer at the server level and the client level. | ||
| | ||
- | [[Image:with_mwl.gif|center]] | + | [[Image:Without_mwl.jpg|center]] |
| | ||
- | '''MicroWorld’s revolutionary concept to tackle the Content Security threats''' | ||
- | The overall business scenario is undergoing a rapid change with Information Technology providing more advanced and rapid means of business communication like Internet and e-mails. However, as far as information that is being made available across the computer systems is concerned, there is a race to restrict its access, guard against information abuse and protect the valuable content. | + | __TOC__ |
+ | |||
+ | |||
+ | =='''With MicroWorld WinSock Layer (MWL)'''== | ||
+ | |||
+ | MWL sits on WinSock. All content passing through WinSock has to mandatorily pass through MWL, where it is checked for any security violating data. If such data occurs, it is removed and the clean data is passed on to the application. | ||
- | Virus-pranksters are now using the Internet as a frictionless distribution channel for dangerous viruses and worms. Over the years, contemporary virus threats have transformed into content security threats. These comprise e-mail and web-based virus downloads, MS Word based macro bombs, offensive e-mail and web content, misuse / abuse of e-mail resources, junk mail and Spam infections, harmful Java or ActiveX applets, intrusion of anonymous Internet users and trespassing of unauthorized bodies into the company's internal network. | ||
| | ||
- | [[Image:winsock.gif|center]] | + | [[Image:With_mwl.jpg|center]] |
| | ||
- | These threats not only damage files and computers by acting as viral agents, but also impose productivity losses, wasting disk space, time and financial resources. Ironically, even as certain methods to guard Content Security have evolved, threats to security have become more severe, even causing destruction of data. However, the systems employed to detect these threats are still handicapped by several deficiencies. The "cure" that is provided by other products only scans data after it is saved on the hard disk; by which time the damage is already done. | + | Note: The main difference between eScan and other Anti-Virus software is that other Anti-Virus software detect infections at the Application layer. By this time, the computer is already infected. eScan works at the Transport layer; this is where the exchange of data takes place. Therefore, it detects viruses and other malicious software before they can enter the computer and infect it. |
- | The "MicroWorld-WinSock Layer" (MWL) is a revolutionary concept in scanning Internet traffic on a real-time basis. This new concept has changed the manner in which Content Security threats are tackled in the knowledge world. MWL is revolutionary because unlike the other products and technologies, currently available, MWL tackles a threat before it reaches your applications. Other products deal with the threat after the applications have already processed it. | + | __TOC__ |
+ | |||
+ | =='''Benefits of MWL'''== | ||
+ | |||
+ | The following are some of the benefits of the MWL technology. | ||
+ | |||
+ | * It acts as a transparent gatekeeper and checks data packets for malicious content. | ||
+ | * It filters and issues dynamic notifications based on the validity of the content. | ||
+ | * It oversees all data flowing to and from the Internet and processes it without interfering with the applications. | ||
+ | * It provides you with dynamic compression and decompression facilities to maximize bandwidth usage while data flows between your computer and the Internet. | ||
+ | |||
+ | __TOC__ | ||
+ | =='''Summary'''== | ||
- | Technically, MWL is placed above the WinSock layer and acts as a "Transparent Gatekeeper" on the WinSock layer of the operating system. All data packets coming on different TCP/IP ports are assembled. It then decodes e-mail and web traffic, FTP and ICQ traffic along with all the attachments and passes them through numerous filters such as Virus Filters, Content Filters, Attachment Filters, etc. These filters check validity of the file's content and issue dynamic notifications. | + | In this chapter, you learnt about MWL and it role in the working of eScan. |
- | MWL technology oversees all data flowing to-and-from the Internet, thereby allowing it to process it without interfering with the applications. Dynamic compression and decompression facilities of data flow, between the Internet and your computer in order to maximize effective bandwidth usage are thus provided by MWL. | + | Return to [[Escan/english/Technologies| <font color="blue">Technologies]] |
Current revision
| · eScan · MailScan · Technologies | · Technical Info · Security Awareness · User Guides |
MicroWorld Winsock Layer (MWL) Technology |
|
[edit] OverviewAnti-Virus software often come with sophisticated mechanisms for detecting and cleaning malware. In most cases, Anti-Virus software detects the presence of a malware only after the computer on which it installed is infected. MWL is a revolutionary technology from MicroWorld that is poised to change the way Anti-Virus software handle security threats. Unlike other Anti-Virus software that are currently available, it detects malware at the Winsock layer itself and prevents them from affect the applications residing at the Application Layer.
[edit] DescriptionHow MWL Works? eScan primarily uses MWL to scan the incoming and outgoing network traffic. MWL is placed above the Winsock layer of the operating system. (See Figure 1. MWL Filters) All data passing through the Winsock layer has to pass through MWL. Thus, MWL acts as a transparent gatekeeper and monitors data packets for malicious content. It assembles the data packets coming from different TCP/IP ports into files based on their type into e mails, e mail attachments, or Web traffic, such as FTP traffic or ICQ traffic. It then passes the files through numerous filters, such as virus filters, content filters, and attachment filters. These filters check and issue dynamic notifications based on the validity of the content within each file.
[edit] Without MicroWorld WinSock Layer (MWL)All incoming and outgoing mails, pass through the WinSock Layer at the server level and the client level.
[edit] With MicroWorld WinSock Layer (MWL)MWL sits on WinSock. All content passing through WinSock has to mandatorily pass through MWL, where it is checked for any security violating data. If such data occurs, it is removed and the clean data is passed on to the application.
[edit] Benefits of MWLThe following are some of the benefits of the MWL technology.
[edit] SummaryIn this chapter, you learnt about MWL and it role in the working of eScan.
|