From eScan Wiki
Revision as of 13:25, 30 August 2010 WikiSysop (Talk | contribs) ← Previous diff |
Current revision WikiSysop (Talk | contribs) |
||
Line 1: | Line 1: | ||
{| class="wikitable" border="0" | {| class="wikitable" border="0" | ||
- | + | |- | |
- | {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | + | |
- | | style="width:56%; color:#000;" | | + | |
- | {| style="width:280px; border:none; background:none;" | + | |
- | | [[Image:Escan_wikipedia.jpg|left|<!--We add confidence to computing-->]] | + | |
- | |} | + | |
- | |width="1000pt" style="width:11%; font-size:95%;" white-space:nowrap;| | + | |
- | <B>General</B> | + | |
- | * [[Main Page|<font color="blue">Home</font>]] | + | |
- | * [[Marketing|<font color="blue">Marketing</font>]] | + | |
- | * [[Events|<font color="blue">Events</font>]] | + | |
- | * [[Marketing/Advertisement|<font color="blue">Advertisement</font>]] | + | |
- | |width="1000pt" style="width:11%; font-size:95%; white-space:nowrap;" | | + | |
- | <B><p> Knowledgebase</p></B> | + | |
- | * [[Technical Info|<font color="blue">Technical Information</font>]] | + | |
- | * [[Beta Testing|<font color="blue">Beta Testing</font>]] | + | |
- | * [[Release Candidate|<font color="blue">Release Candidate</font>]] | + | |
- | * [[User Guide|<font color="blue">User Guides</font>]] | + | |
- | * [[Escan/english/Technologies|<font color="blue">Technologies</font>]] | + | |
- | |width="1000pt" style="width:11%; font-size:95%;white-space:nowrap;" | | + | |
- | <B><p> Support</p></B> | + | |
- | * [[EMail|<font color="blue">eMail</font>]] | + | |
- | * [[Online Chat|<font color="blue">Online Chat</font>]] | + | |
- | * [[Telephonic Support|<font color="blue">Telephone</font>]] | + | |
- | * [[Remote Support|<font color="blue">Remote Support</font>]] | + | |
- | * [[Forums|<font color="blue">Forums</font>]] | + | |
- | |} | + | |
- | {| class="wikitable" border="0" | + | |
- | |} | + | |
- | + | ||
{| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | {| id="mp-topbanner" style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | ||
| style="width:10%; color:#000;" | | | style="width:10%; color:#000;" | | ||
Line 35: | Line 6: | ||
| [[Image:escan-g.jpg]] | | [[Image:escan-g.jpg]] | ||
|} | |} | ||
- | |style="text-align:left;"|'''·''' [[Escan/english/eScan-Articles|<font size=1.5 color="blue" align="left">Articles</font>]] '''·''' [[Escan/english/eScan-FAQ|<font size=1.5 color="blue">FAQ</font>]] '''·''' [[Escan/english/eScan-Troubleshooting|<font size=1.5 color="blue">Troubleshooting</font>]] | + | |style="text-align:left;"|'''·''' [[Escan/english/FAQ-eScan|<font size=1.5 color="blue" |
- | |style="text-align:right;"| '''·''' [[Technical Info|<font size=1.5 color="blue">Technical Information - Main Page</font>]] | + | |
+ | align="left">eScan</font>]] '''·''' [[Escan/english/MailScan-AFT|<font size=1.5 | ||
+ | |||
+ | color="blue">MailScan</font>]] '''·''' [[Escan/english/Technologies|<font size=1.5 | ||
+ | |||
+ | color="blue">Technologies</font>]] | ||
+ | |style="text-align:right;"| '''·''' [[Technical Info|<font size=1.5 color="blue">Technical | ||
+ | |||
+ | Info</font>]] '''·''' [[Escan/english/Security_Awareness|<font size=1.5 color="blue">Security | ||
+ | |||
+ | Awareness</font>]] '''·''' [[User_Guides|<font size=1.5 color="blue">User Guides</font>]] | ||
|} | |} | ||
Line 72: | Line 53: | ||
eScan primarily uses MWL to scan the incoming and outgoing network traffic. MWL is placed above the Winsock layer of the operating system. (See Figure 1. MWL Filters) All data passing through the Winsock layer has to pass through MWL. Thus, MWL acts as a transparent gatekeeper and monitors data packets for malicious content. It assembles the data packets coming from different TCP/IP ports into files based on their type into e mails, e mail attachments, or Web traffic, such as FTP traffic or ICQ traffic. It then passes the files through numerous filters, such as virus filters, content filters, and attachment filters. These filters check and issue dynamic notifications based on the validity of the content within each file. | eScan primarily uses MWL to scan the incoming and outgoing network traffic. MWL is placed above the Winsock layer of the operating system. (See Figure 1. MWL Filters) All data passing through the Winsock layer has to pass through MWL. Thus, MWL acts as a transparent gatekeeper and monitors data packets for malicious content. It assembles the data packets coming from different TCP/IP ports into files based on their type into e mails, e mail attachments, or Web traffic, such as FTP traffic or ICQ traffic. It then passes the files through numerous filters, such as virus filters, content filters, and attachment filters. These filters check and issue dynamic notifications based on the validity of the content within each file. | ||
+ | |||
+ | | ||
+ | [[Image:Winsock.jpg|center]] | ||
+ | | ||
+ | |||
Line 83: | Line 69: | ||
| | ||
- | [[Image:without_mwl.gif|center]] | + | [[Image:Without_mwl.jpg|center]] |
| | ||
Line 98: | Line 84: | ||
| | ||
- | [[Image:with_mwl.gif|center]] | + | [[Image:With_mwl.jpg|center]] |
| | ||
Line 116: | Line 102: | ||
* It provides you with dynamic compression and decompression facilities to maximize bandwidth usage while data flows between your computer and the Internet. | * It provides you with dynamic compression and decompression facilities to maximize bandwidth usage while data flows between your computer and the Internet. | ||
+ | __TOC__ | ||
+ | =='''Summary'''== | ||
- | + | In this chapter, you learnt about MWL and it role in the working of eScan. | |
- | '''MicroWorld’s revolutionary concept to tackle the Content Security threats''' | + | |
- | + | ||
- | The overall business scenario is undergoing a rapid change with Information Technology providing more advanced and rapid means of business communication like Internet and e-mails. However, as far as information that is being made available across the computer systems is concerned, there is a race to restrict its access, guard against information abuse and protect the valuable content. | + | |
- | + | ||
- | Virus-pranksters are now using the Internet as a frictionless distribution channel for dangerous viruses and worms. Over the years, contemporary virus threats have transformed into content security threats. These comprise e-mail and web-based virus downloads, MS Word based macro bombs, offensive e-mail and web content, misuse / abuse of e-mail resources, junk mail and Spam infections, harmful Java or ActiveX applets, intrusion of anonymous Internet users and trespassing of unauthorized bodies into the company's internal network. | + | |
- | + | ||
- | + | ||
- | | + | |
- | [[Image:winsock.gif|center]] | + | |
- | | + | |
- | + | ||
- | + | ||
- | These threats not only damage files and computers by acting as viral agents, but also impose productivity losses, wasting disk space, time and financial resources. Ironically, even as certain methods to guard Content Security have evolved, threats to security have become more severe, even causing destruction of data. However, the systems employed to detect these threats are still handicapped by several deficiencies. The "cure" that is provided by other products only scans data after it is saved on the hard disk; by which time the damage is already done. | + | |
- | + | ||
- | + | ||
- | The "MicroWorld-WinSock Layer" (MWL) is a revolutionary concept in scanning Internet traffic on a real-time basis. This new concept has changed the manner in which Content Security threats are tackled in the knowledge world. MWL is revolutionary because unlike the other products and technologies, currently available, MWL tackles a threat before it reaches your applications. Other products deal with the threat after the applications have already processed it. | + | |
- | + | ||
- | + | ||
- | Technically, MWL is placed above the WinSock layer and acts as a "Transparent Gatekeeper" on the WinSock layer of the operating system. All data packets coming on different TCP/IP ports are assembled. It then decodes e-mail and web traffic, FTP and ICQ traffic along with all the attachments and passes them through numerous filters such as Virus Filters, Content Filters, Attachment Filters, etc. These filters check validity of the file's content and issue dynamic notifications. | + | |
- | MWL technology oversees all data flowing to-and-from the Internet, thereby allowing it to process it without interfering with the applications. Dynamic compression and decompression facilities of data flow, between the Internet and your computer in order to maximize effective bandwidth usage are thus provided by MWL. | + | Return to [[Escan/english/Technologies| <font color="blue">Technologies]] |
Current revision
| · eScan · MailScan · Technologies | · Technical Info · Security Awareness · User Guides |
MicroWorld Winsock Layer (MWL) Technology |
|
[edit] OverviewAnti-Virus software often come with sophisticated mechanisms for detecting and cleaning malware. In most cases, Anti-Virus software detects the presence of a malware only after the computer on which it installed is infected. MWL is a revolutionary technology from MicroWorld that is poised to change the way Anti-Virus software handle security threats. Unlike other Anti-Virus software that are currently available, it detects malware at the Winsock layer itself and prevents them from affect the applications residing at the Application Layer.
[edit] DescriptionHow MWL Works? eScan primarily uses MWL to scan the incoming and outgoing network traffic. MWL is placed above the Winsock layer of the operating system. (See Figure 1. MWL Filters) All data passing through the Winsock layer has to pass through MWL. Thus, MWL acts as a transparent gatekeeper and monitors data packets for malicious content. It assembles the data packets coming from different TCP/IP ports into files based on their type into e mails, e mail attachments, or Web traffic, such as FTP traffic or ICQ traffic. It then passes the files through numerous filters, such as virus filters, content filters, and attachment filters. These filters check and issue dynamic notifications based on the validity of the content within each file.
[edit] Without MicroWorld WinSock Layer (MWL)All incoming and outgoing mails, pass through the WinSock Layer at the server level and the client level.
[edit] With MicroWorld WinSock Layer (MWL)MWL sits on WinSock. All content passing through WinSock has to mandatorily pass through MWL, where it is checked for any security violating data. If such data occurs, it is removed and the clean data is passed on to the application.
[edit] Benefits of MWLThe following are some of the benefits of the MWL technology.
[edit] SummaryIn this chapter, you learnt about MWL and it role in the working of eScan.
|