eScan BlogeScan Blog    eScan WebsiteeScan Website    eScan ForumeScan Forum    eScan FeedseScan Feeds     
    
Languages:     

From eScan Wiki

(Difference between revisions)
Jump to: navigation, search
Revision as of 11:29, 30 August 2008
WikiSysop (Talk | contribs)

← Previous diff
Revision as of 12:08, 30 August 2008
WikiSysop (Talk | contribs)

Next diff →
Line 5: Line 5:
On the Privacy Control option page in the “Configuration” section, when clicked on the “Settings” option, one can change the Privacy Control Protection level, whereas the “Clear Now” option (next to Settings) is provided to run the module manually. On the Privacy Control option page in the “Configuration” section, when clicked on the “Settings” option, one can change the Privacy Control Protection level, whereas the “Clear Now” option (next to Settings) is provided to run the module manually.
-'''Configuration section -''' When clicked on “Settings” the below options are available, through which the eScan software’s Privacy Control protection can be customized -+ 
 + 
 +'''Configuration section -'''
 + 
 +When clicked on “Settings” the below options are available, through which the eScan software’s Privacy Control protection can be customized -
a. Browser Cleanup:- a. Browser Cleanup:-
Line 90: Line 94:
Every time you open a Web page, your browser creates a cache file (a temporary copy) of the page's text and graphics. When you open the page again, your browser checks the Web site server for changes to the page. If the page has changed, your browser retrieves a new version. If the page hasn't changed, your browser uses the cache files from your RAM or hard drive to display the page. For example, Internet Explorer caches Web pages to both memory (RAM) and disk (hard drive) until the respective cache is full; Internet Explorer then rotates out pages based on age. Internet Explorer designed this system to help load Web pages quicker. However, if you've viewed lots of Web pages, you may have an overloaded hard disk cache, which Internet Explorer will have to check before it loads a new page. Unfortunately, over time, your browser's cache grows. A cache full of outdated information is worse than no cache at all. It causes problems with Java applets, causes you to see out of date text or images, and slows your browser. This also gives an easy means to others to find out your surfing habits. Every time you open a Web page, your browser creates a cache file (a temporary copy) of the page's text and graphics. When you open the page again, your browser checks the Web site server for changes to the page. If the page has changed, your browser retrieves a new version. If the page hasn't changed, your browser uses the cache files from your RAM or hard drive to display the page. For example, Internet Explorer caches Web pages to both memory (RAM) and disk (hard drive) until the respective cache is full; Internet Explorer then rotates out pages based on age. Internet Explorer designed this system to help load Web pages quicker. However, if you've viewed lots of Web pages, you may have an overloaded hard disk cache, which Internet Explorer will have to check before it loads a new page. Unfortunately, over time, your browser's cache grows. A cache full of outdated information is worse than no cache at all. It causes problems with Java applets, causes you to see out of date text or images, and slows your browser. This also gives an easy means to others to find out your surfing habits.
- 
L) Clear Cookies - L) Clear Cookies -
Cookies are basically files that store information generated by a web server and stored on your computer (from a website) and acts as a shortcut when you access the same website in the near future. Cookies make a part of the HTML information that flows to and fro between the user's computer and the web servers, as a result web servers automatically gain access to relevant cookies whenever the user re-visits the website (it is usually in the form of web requests). Most of the time, not only does the storage of such personal information into a cookie go unseen/ unobserved but also the access to it because it is not visible to the naked eye (it all happens in the background). This information can be used to track the way you browse (surfing habits) and this information if known to other users will enable them to know what you did on the system and also allow them to misuse it. Cookies are basically files that store information generated by a web server and stored on your computer (from a website) and acts as a shortcut when you access the same website in the near future. Cookies make a part of the HTML information that flows to and fro between the user's computer and the web servers, as a result web servers automatically gain access to relevant cookies whenever the user re-visits the website (it is usually in the form of web requests). Most of the time, not only does the storage of such personal information into a cookie go unseen/ unobserved but also the access to it because it is not visible to the naked eye (it all happens in the background). This information can be used to track the way you browse (surfing habits) and this information if known to other users will enable them to know what you did on the system and also allow them to misuse it.
- 
M) Clear PlugIns - M) Clear PlugIns -
Line 120: Line 122:
This option runs/executes the auto-eraser to clear all the selected options from the list, thus aiding in fine tuning and improving the system's performance. This option runs/executes the auto-eraser to clear all the selected options from the list, thus aiding in fine tuning and improving the system's performance.
 +
At the bottom end of the same page, there are other options available like - At the bottom end of the same page, there are other options available like -
Line 139: Line 142:
e) Unselect All - All the options listed above would be unchecked. e) Unselect All - All the options listed above would be unchecked.
f) Internet Explorer - the files held within the browser (IE) like cookies are treated differently and for which these options are available - f) Internet Explorer - the files held within the browser (IE) like cookies are treated differently and for which these options are available -
 +
Options - Options -
Line 148: Line 152:
-b. File Rights:-+File Rights:-
This option is also known as “Remote Access File Rights” and /or “NetBIOS Firewsll”. It helps to prevent /block malwares (malicious) programs from propagating themselves. This option is also known as “Remote Access File Rights” and /or “NetBIOS Firewsll”. It helps to prevent /block malwares (malicious) programs from propagating themselves.
Line 164: Line 168:
For example - when a worm gets onto a system, it never remains dormant, but propagates itself throughout the network (using network shares). When the above option is enabled, it prevents/blocks the worm from spreading itself on the network (other systems) i.e. from creating and modifying the system's local files among others like the one's mentioned above. These file types can be customized as per one's requirements. For example - when a worm gets onto a system, it never remains dormant, but propagates itself throughout the network (using network shares). When the above option is enabled, it prevents/blocks the worm from spreading itself on the network (other systems) i.e. from creating and modifying the system's local files among others like the one's mentioned above. These file types can be customized as per one's requirements.
- 
4) Allow creation and modification for following files - 4) Allow creation and modification for following files -
Line 184: Line 187:
This displays the details of when the computer system was last cleaned on (date). This displays the details of when the computer system was last cleaned on (date).
 +
 +
 +
 +Note:- Depending on the subscription, some of the listed items may be unavailable.

Revision as of 12:08, 30 August 2008

Privacy Control -

Shows the current status of Privacy Control Protection level. The green color right tick mark denotes that the module is “Active” while the red color cross mark displays that the module is “InActive”.

On the Privacy Control option page in the “Configuration” section, when clicked on the “Settings” option, one can change the Privacy Control Protection level, whereas the “Clear Now” option (next to Settings) is provided to run the module manually.


Configuration section -

When clicked on “Settings” the below options are available, through which the eScan software’s Privacy Control protection can be customized -

a. Browser Cleanup:-

This option helps to clear all the unwanted files created on the system when browsing the internet as well as by other softwares installed.

It has different options like "Scheduler Options" and "Auto Erase Options".

i) Scheduler options -

This option helps in scheduling the auto-eraser of the below mentioned point no. B functions.

1. Run at System Startup –

This option is not enabled by default. When enabled, it auto-executes itself at system startup (boot-up)and performs the desired auto-erase functionalities.

2. Run Everyday at –

This option is not enabled by default. When enabled, it auto-executes itself at the time specified within the software.




ii) Auto Erase options -

This option helps in automatically -

1) Cleaning up the hard-disk (make free space) 2) Effective optimization and maintainence of system resources (cpu, ram, etc...) 3) Private (Confidential) data is secured 4) Keeping the hackers at bay 5) Keeping the crackers at bay 6) Keeping the intruders at bay 7) Securing from Online Thefts 8) Securing from Online Frauds 9) Securing from worms, spywares, password stealing trojans, etc... 10) Troubleshooting and problem solving ease with comprehensive report (log)

and performs these functions –

A) Clear Auto-Complete Memory -

When you browse, the browser on your system stores "N" records of the data you enter on a website (form), keywords typed into a search engine, your personal information-name and address, etc... , this information can be used to track the way you browse (surfing habits).

B) Clear Last Run Menu Command -

Windows stores executed programs (run) in the start menu run command text box, so everytime you don't have to re-type the same, this information if known to other users will enable them to know what you did on the system and also allow them to execute/run it.

C) Clear Temporary Folder/s -

Every time you install a software, open a document or a web page, a temporary file gets created in the temporary folder/s. If this temporary folder is not cleared on a regular basis, it will cause problems with accessing data, slowing down of the system, etc..., this results in ineffeciency of the system resources being used.

D) Clear Last Find Computer -

Windows stores searched queries in a temporary file (log), so everytime you don't have to re-type the same for searching, this information if known to other users will enable them to know what you did on the system and also allow them to execute/run it.

E) Clear Browser Address Bar History -

The website address you typed and visited are stored in the browser's address bar history and the operating system on it's own does not delete (clear) them automatically, this information if known to other users will enable them to know what you did on the system and also misuse it.

F) Clear Last Search Menu -

Windows stores searched queries in a temporary file (log), so everytime you don't have to re-type the same for searching, this information if known to other users will enable them to know what you did on the system and also allow them to misuse it.

G) Clear Recent Documents -

Windows stores the recent documents made and accessed in a temporary file (log), this information if known to other users will enable them to know what were the documents you worked on the system and also allow them to misuse it.

H) Clear Files and Folders -

This option has to be used with caution as it helps to permanently clear, delete unwanted files and folders from the system thus efficiently making free space on the system.

I) Clear Open/Save Dialog Box History -

Windows stores links of all files opened and saved, in the registry,so next when you open or save a file, it displays a list of the files accessed and this information if known to other users will enable them to know what you did on the system and also allow them to misuse it.

J) Empty Recycle Bin -

This option has to be used with caution as it helps to permanently clear the recycle bin of all the deleted files and folders from the system thus efficiently making free space on the system.

K) Clear Cache (Temporary Internet Files ) & History -

Every time you open a Web page, your browser creates a cache file (a temporary copy) of the page's text and graphics. When you open the page again, your browser checks the Web site server for changes to the page. If the page has changed, your browser retrieves a new version. If the page hasn't changed, your browser uses the cache files from your RAM or hard drive to display the page. For example, Internet Explorer caches Web pages to both memory (RAM) and disk (hard drive) until the respective cache is full; Internet Explorer then rotates out pages based on age. Internet Explorer designed this system to help load Web pages quicker. However, if you've viewed lots of Web pages, you may have an overloaded hard disk cache, which Internet Explorer will have to check before it loads a new page. Unfortunately, over time, your browser's cache grows. A cache full of outdated information is worse than no cache at all. It causes problems with Java applets, causes you to see out of date text or images, and slows your browser. This also gives an easy means to others to find out your surfing habits.

L) Clear Cookies -

Cookies are basically files that store information generated by a web server and stored on your computer (from a website) and acts as a shortcut when you access the same website in the near future. Cookies make a part of the HTML information that flows to and fro between the user's computer and the web servers, as a result web servers automatically gain access to relevant cookies whenever the user re-visits the website (it is usually in the form of web requests). Most of the time, not only does the storage of such personal information into a cookie go unseen/ unobserved but also the access to it because it is not visible to the naked eye (it all happens in the background). This information can be used to track the way you browse (surfing habits) and this information if known to other users will enable them to know what you did on the system and also allow them to misuse it.

M) Clear PlugIns -

PlugIn is a add-on (hardware or software) module that adds a specific feature, functionality or service to an existing system. For example - Netscape navigator uses PlugIns to display different types of audio or video messages. This information if known to other users can be used to trace the URL's or web pages you visited and misuse it.

N) Clear ActiveX -

ActiveX is a technology developed by Microsoft. ActiveX is a set of rules that specify how applications should share information. With an ActiveX-enabled browser, ActiveX controls can be downloaded as part of a Web document to add functionality to the browser (similar to Java applets). This information if known to other users can be used to track the sites and pages you visited and misuse it.

O) Clear History -

When you visit a site, the site name along with the pages opened, images or files downloaded, etc.... are stored in your system in a folder called the history folder, the next time you visit the same site, the browser checks this history folder and quickly opens the website with the information it already has about the website.As a result, the history folder offers a very easy way to find out about the sites you have accessed and this information if known to other users can be used to track the sites and pages you visited and misuse it.

P) Unselect All -

This option de-selects all the options you had selected from this list.

Q) Select All -

This option selects all the options available in the list

R) Run Checked -

This option runs/executes the auto-eraser to clear all the selected options from the list, thus aiding in fine tuning and improving the system's performance.


At the bottom end of the same page, there are other options available like -

1. Browsers - these is the list of browsers that are supported by this module. 2. General - this displays all of the above mentioned options to be selected for use 3. Cache - displays the list of cached items. 4. Cookies - displays the list of cookies. 5. ActiveX - displays the list of ActiveX components. 6. PlugIns - displays the list of plugin components. 7. History - displays the history of the websites surfed. 8. Files & Folders - displays the list of files & folders that would be cleared/deleted when this auto-eraser is run/executed, it displays all system, read only and hidden files. 9. Advanced - this is an option to further customize which files need to be cleared/deleted from the system.

a) MS Office - it includes files from the MS-Office suite like Word, Excel, Powerpoint, FrontPage and Access. b) Windows - it includes files from tasks performed within the windows environment like temp files created by the Scan Disk, ClipBoard Data, Start Menu Order History, Registry Streams MRU & Applicatioon Log. c) Others - it includes files created by other softwares like Windows Media Player play list, Windows Media Player History. d) Select All - All the options listed above would be checked. e) Unselect All - All the options listed above would be unchecked. f) Internet Explorer - the files held within the browser (IE) like cookies are treated differently and for which these options are available -


Options - a) List of Cookies - lists the cookies detected on the system. i) Add to Exclude list - you can add any cookie listed to the exclude list. ii) Remove from the Exclude list - you can delete any cookie from the list b) Exclude list of Cookies - the cookies that are excluded from the list are displayed here, i.e. the cookies that are added to the exclude list (just above).


File Rights:-

This option is also known as “Remote Access File Rights” and /or “NetBIOS Firewsll”. It helps to prevent /block malwares (malicious) programs from propagating themselves.

It has different options like "Do not allow remote users to modify the following local files", "Allow modification for following files", "Do not allow remote users to create and modify following local files" and "Allow creation and modification for following files".

1) Do not allow remote users to modify the following local files - this option is not enabled by default. When enabled, this option does not allow any remote user to modify any of the local files.

2) Allow modification for following files - this option is not enabled by default. When enabled, this option allows a remote user to modify any of the local files.

3) Do not allow remote users to create and modify following local files - this option is not enabled by default. When enabled, this option does not allow any remote user to create and modify any of the following local files, for example - autoexec.bat, config.sys,win.ini,*.com,exe,bat,dll,eml,nws,ocx,pif,rar,scr.

For example - when a worm gets onto a system, it never remains dormant, but propagates itself throughout the network (using network shares). When the above option is enabled, it prevents/blocks the worm from spreading itself on the network (other systems) i.e. from creating and modifying the system's local files among others like the one's mentioned above. These file types can be customized as per one's requirements.

4) Allow creation and modification for following files -

This option is not enabled by default. When enabled, this option allows any remote user to create and modify any of the following local files, for example - spool\*,sys\es_setup\*,tmp\*,win\*.idx,win\*.swp,win\sysvol\*,win\temp\*

For example - if a network administrator wants to deploy a software on the network (all systems)and as is evident, for this task to be successful requires a temporary storage space on the target/ destination. As per the above option (C), incase on the target/destination the temporary storage space [where the software is being deployed needs to be copied and extracted (\windows\temp)] is not available, then the software that is being deployed by the administrator would never get installed on the target/destination systems,so,to overcome this, the option to allow creation and modification for certain files and folders is made available. These file and folder types can be customized as per one's requirements.

At the bottom end of this Privacy Control option page in the “Reports” section, there is an option available called the “Last Cleaned on”.



Reports section -

The below options is available within -

a. Last Cleaned on -

This displays the details of when the computer system was last cleaned on (date).


Note:- Depending on the subscription, some of the listed items may be unavailable.


eScan Copyright © 2015 MicroWorld Technologies Inc.- AntiVirus & Content Security.       Send your feedback to solutions@escanav.com eScan Wiki

    Privacy policy  About eScan Wiki  Disclaimers