Lots of malicious code would love to jump from the Internet into your computer's nooks and crannies to wreak havoc. Trojan Trap "wraps around" both known and unknown applications and controls their access to system resources, such as memory, the Registry, and space on the hard drive. This prevents unknown or unauthorized applications--such as worms or Trojan horses--from damaging your data and system files. It protects workstations and networks from attacks by any kind of active content (ActiveX, Java, VBS, and other executable code) received from the Internet or by any other means.
With Trojan Trap you can restrict any application's access to your computer's resources. It shields and monitors drivers, the Registry database, and the file system to protect the privacy and integrity of your system. It checks all actions and access to resources, blocking only suspicious or unwanted actions. This protects your computer from damage from intentional attacks as well as from buggy software.
During installation Trojan Trap scans the workstation for already installed or known applications. In addition, it sets up preconfigured default sandboxes around the most common Web browsers (Netscape and Internet Explorer), e-mail clients (Outlook, Outlook Express, and Lotus Notes), and a restricted area for unknown applications (high restricted application group).
|Operating System Compatibility||
|File Size||9.743 MB|