Professional Documents
Culture Documents
A virus might corrupt or delete data on your computer, use your e-mail
program or LAN to spread itself to other computers, or even erase
everything on your hard disk
Symptoms of a computer virus
Message
What is Trojan Horse ?
• A Trojan horse is not a virus. It is a program that you run because you
think it will serve a useful purpose such as a game or provides
entertainment.
• For example, you might download what you think is a new game; but
when you run it, it deletes files on your hard drive .
• Or the third time you start the game, the program E-mails your saved
passwords to another person who writes this program.
• it will scour your hard drive for any personal and financial information
such as your social security, account, and PIN numbers. Once it has
collected your info, it is sent to a thief’s database.
Symptoms of worms and Trojan horse
viruses in e-mail messages
• The infected file may make copies of itself. This behavior may use
up all the free space on the hard disk.
• A copy of the infected file may be sent to all the addresses in an e-
mail address list.
• The computer virus may reformat the hard disk. This behavior will
delete files and programs.
• The computer virus may install hidden programs, such as pirated
software. This pirated software may then be distributed and sold
from the computer.
Symptoms of worms and Trojan horse
viruses in e-mail messages (Cont.)
VPN Router
PC PC PC
Switch Router
Antivirus Parents Server
Router
Router
Switch
VPN
PC PC PC
Router
PC PC PC Router
Switch
Antivirus Child Server Switch
PC PC PC
PC PC PC
A) Antivirus Parent Server will be updated directly from Internet. In scheduled interval the child server/PC’s attached
with the parent server will be updated automatically.
B) Antivirus Child Server will be updated from Parent server. The child server will updated all other’s PC’s attached with it.
Use Any good Anti Virus
eScan Version 10
eScan Management Console
Presenting eScan Version 10
Confidential Property
Exciting New Features
• Proactive Security
• New User Friendly GUI
• Faster On Demand Scans
• Parental Control
• Full Fledged Firewall
• End Point Security
• Block Games/Chat/
Media Player/P2P Applications
• Registry Monitoring
• Suspicious Application
Detection
• Enhanced Comprehensive
Reports
Confidential Property
Password Protection with read only access
Confidential Property
eScan Version 10 - GUI
Confidential Property
eScan Protection Center
Confidential Property
Protection Center – File AntiVirus
Confidential Property
File Anti-Virus : Features
Features include:
• New File Monitor (intelligent and Faster)
• MWL Scanning
• Real-Time AV Scanning
• Spyware, Adware, Keylogger, & Rootkit Blocker
• Registry Monitoring
Confidential Property
Protection Center – Mail AntiVirus
Confidential Property
Mail Anti-Virus : Features
Features include:
• Real-Time eMail Scan
• Password Protected settings
Confidential Property
Protection Center – Web AntiVirus
Confidential Property
Web Anti-Virus : Features
Features include:
• Web/FTP/CHAT Scanning
• Block Pop-Ups
Confidential Property
Protection Center – End Point Security
Confidential Property
End Point Security :
Features
Features include:
• USB / Firewire Control
• Application Control
Confidential Property
Protection Center – Privacy Control
Confidential Property
Privacy Control : Features
Features include:
• Spyware & Keylogger Blocker
• Block Pop-Ups
Confidential Property
Protection Center – Anti Spam
Confidential Property
Protection Center – Firewall
Confidential Property
Scan
Confidential Property
Scan
Confidential Property
Custom Scan Options
Confidential Property
Custom Scan Options (Cont.)
Confidential Property
Scan : Features
Features include:
• Heuristic Scanning
Confidential Property
Compressed Updates
Confidential Property
Useful Tools
Confidential Property
How to Quick Scan Your System ?
Scan your PC by MWAV
eScan 10 Product Comparison
Confidential Property
eScan 10 Product Comparison Contd..
Confidential Property
eScan 10 Product Comparison Contd..
Confidential Property
eScan 10 Product Comparison Contd..
Confidential Property
eScan 10 Product Comparison Contd..
Confidential Property
Information Technology Division
Thank You
Confidential Property