Ads 468x60px

Tuesday, 10 July 2012

Zillya internet security

Zillya internet security software full version free download full version 

 

 

 

1.Low system resources consumption

 Zillya! Internet Security takes only 200-240Mb of memory.

2. Simple and friendly user interface

 Zillya! Internet Security employs simple and very user-fiendly interface that could be easily understood even by beginner users. There are no complex settings or advanced functionality – only the most important ones are available. All settings are well-grouped by categories.

3. Instant display of current status of product 

 Zillya! Internet Security is automatically monitoring status of system protection and gives brief overview of system security in System Status pane. Also tray icon serves as an additional indicator.

4.  Complete antivirus functionality 

 Zillya! Internet Security has all antivirus functionality

that is available in Zillya! Antivirus product:
Real-time filechecking that detects and prevents viruses or other malware that are attempting tointrude user’s computer
Mail filter checks all incoming and outgoing mail messages for malware enabling safe and secure e-mail communication
Heuristic analysis allows detection of new and unknown malware
There are three types of scanning – quick scan that checks only critical are as on the computer, fullscan that checks all files on the computer and custom scan which allows user to select files and folders to be scanned
Daily updates of antivirus bases guarantee maximum safety
You might read more about Zillya! Antivirus here

5.  Application-level firewall

Control of application network access.Firewallmonitors all attempts to access network – both incoming and outgoing traffic.
Protection against external attacks.By default Firewall allows applications only outbound connections. This allows to protect system against malicious attempts to take control over it.
Heuristic analysis allows detection of new and unknown malware
Automatic mode that doesn’t require deep understanding of applications network functionality. For users not familiar with firewalls and its settings there is the Automatic mode. In this mode all applications that require networks access are allowed to make outbound connections, and inbound connections are blocked. This is optimal security mode which doesn’t require any user’s intervention.
Interactive mode for experienced users. If user knows how to set up firewall rules for applications he uses there is Interactive mode. User might choose one off our profiles for each application:


Block All–completely blocks all network activity for
the application,
Allow All–allows any network activity for the application,
Allow Outgoing Only – allows the application to make outbound connections,
Custom– allows to customize set of network resources that might be accessed by an application: enable or disable individual IP address, IP range, mask),open or close particular port, choose to apply rule to TCP connections, UDP packets or both.
Built-in set of rules. Application has built-in set of rules that has all necessary rules to allow functioning of standard system services and protocols(NetBios, DHCP, DNS etc.) With these rules network activity of particular protocol or service could be easily enabled or disabled.
System-wide application rules. Zillya! Internet Security enables user to specify common setting s for all applications in the system, for example allowing all applications to access particular server. This eliminates the need to allows this server for each application individually.


6. WEB-filtering (scanning of HTTP traffic)

Blocking of dangerous sites. Zillya! Internet Security might block user from accessing certain sites that are known to be malicious.
Blocking of malicious content from untrusted sites. Some sites are added to database of Zillya! Internet Security as untrusted, these are the ones that might contain malicious content.If site is listed this way user might browse it, but any attempts to download executable, archive or other types of files would be blocked.
Creation of own list of sites to block.In Web-filter user might specify list of sites that he thinks are malicious. Each site might be listed as dangerous or untrusted. All rules that apply to built-in database apply to the sites specified by user.













 

 


0 comments:

Post a Comment

Useful Links

Related Posts Plugin for WordPress, Blogger...