Features of Max Secure Internet Security 2012




1. Most Effective protection against Spyware, Malware, Adware, Key logger and Rootkit
2. Fast Scan Technology
3. Advanced Monitoring prompts warn you in case any program makes illegal entries in critical
registry locations.

1. Complete USB block for total safety from external devices
2. Uninterrupted external Drive scan and notification, automated removal of Malware. Also,
prevents Host PC from getting infected wit pen drives or pen drives from getting infected
from host pc so prevents spread of Malware infections.
3. Auto Run and Short-cut creation protection so minimize virus transmission to other PCs.

complex Malware.
1. Heuristic Scanning for zero Day Virus Detection
2. Easy Recovery of any quarantined file in case you need it
3. Real time Active Protection for Virus and Rootkit in memory

operating system files

our website

samples to our Lab for analysis using cloud technology

by our Research Teamavailable for safe mode scan , create yourself by downloading it
from our website.




1. Web, SMS and Off-line Registration and Activation of product
2. License for years or Days, as desired
3. Free 30 Day Demo

or applications on demand.

but your other applications get priority.
Secure Online Banking and Shopping

Prevents Bad websites from being browsed. In addition to malicious bad websites database provided by our lab, users can also add sites to this list and block any website they do not wish their kids or family to visit. Blocks any malicious websites making access to their remote server.

Scan all incoming and outgoing emails in outlook for viruses, Malware, Trojans. As well as for Phishing or Spamming attacks.

Block spam websites from being browsed o come in your mail box. Scans all Outlook emails and moves suspicious mails to the Anti spam folder for your review. Guards against unwanted spam.

Protect your data from phishing attacks and use our defined phishing list and also add your own with ease. Prevent cybercriminals from stealing your digital identity.
Support


on customers PCs

1. Windows® 2000 Professional SP4 KB891861
2. For all Windows versions of 32 bit and 64-bit
Windows® XP with SP1 and above
Windows® Vista Ultimate
Windows® Vista Home Premium
Windows® Vista Home Basic
Windows® Vista Business
Windows® Vista Enterprise
Windows® 7 Ultimate
Windows® 7 Home Premium
Windows® 7 Home Basic
Windows® 7 Business
Windows® 7 Enterprise

(recommended 512 MB), 500 MB of free hard disk space, and a CD-ROM or USB drive
or Internet for the availability of Set up file.
What is Firewall?
Firewall is a piece of software or
hardware that helps screen out hackers, viruses, and worms that try to reach
your computer over the Internet. If you are a home user or a business user,
using a firewall is the most effective and important first step you can take to
help protect your computer.
Max Secure Firewall provides a robust way to effectively filter network traffic, prevent malicious behavior, protect running processes and filter web content. It provides filtering of I/O requests at the kernel and user levels. Max Secure Firewall is one of the best defenses against malicious software attacks on your system.
1. Network Filter:
The firewall keeps track of all communications that have originated from your computer, and it prevents unsolicited traffic from reaching your computer. The two-way firewall monitors your computer’s inbound and outbound connections and prevents local and remote unauthorized network access. You can specify if you wish to block communication from a range of network addresses or protocols.
A set of rules are provided for specific well-known protocols. This is provided for convenience so that user don’t have to have deep protocol knowledge to configure them.
2. Application Rules:
This is a set of rules that manage how certain applications will access the network. These rules are based only on the application path; they don’t configure any port/protocol. They can allow all communications coming to/going from the application. You can add any application by clicking on Add button and specify rule such as allow or block. Blocked application will not be allowed to be executed on this PC. A firewall will help protect a computer on a wireless network, but will not restrict access to the network itself. You security on wireless network, you should configure your wireless network to use a network key using either Wi-Fi Protected Access (WPA) or wired equivalent privacy (WEP). For more information, consult the manual for your wireless networking devices.
3. Internet Filter:
Anti Phishing, Anti banner and Bad Website blocking : This feature protects the incoming web traffic and prevents denagerous scripts and urls from being browsed on your PC. You can also add your urls by domain name or any sub-string if you want.
Anti-Banner: blocks advertising information located on banners, built into interfaces of various programs installed on your computer, or displayed online, mostly in browsers. Not only are banner ads devoid of useful information but they also distract you from your work and increase the amount of traffic on your computer.
Anti-Phishing: protects you from phishing. Phishing generally consists of e-mails from fake financial institutions that contain links to their websites which look alike some genuine bank or financial institution. . The message text convinces the reader to click the link and enter confidential information in the window that follows, for example, a credit card number or a login and password or an Internet banking site where financial operations can be carried out.
Bad Website blocking: The module is designed to provide safe Internet surfing by restricting access to unsecure web resources, websites which have been considered as suspicious or phishing.
4. Email Scan: Scans all incoming and outgoing messages and their attachements. Pop3, SMTP, IMAP, MAPI and NNTP protocols are supported.
Max Secure Firewall provides a robust way to effectively filter network traffic, prevent malicious behavior, protect running processes and filter web content. It provides filtering of I/O requests at the kernel and user levels. Max Secure Firewall is one of the best defenses against malicious software attacks on your system.
1. Network Filter:
The firewall keeps track of all communications that have originated from your computer, and it prevents unsolicited traffic from reaching your computer. The two-way firewall monitors your computer’s inbound and outbound connections and prevents local and remote unauthorized network access. You can specify if you wish to block communication from a range of network addresses or protocols.
A set of rules are provided for specific well-known protocols. This is provided for convenience so that user don’t have to have deep protocol knowledge to configure them.
2. Application Rules:
This is a set of rules that manage how certain applications will access the network. These rules are based only on the application path; they don’t configure any port/protocol. They can allow all communications coming to/going from the application. You can add any application by clicking on Add button and specify rule such as allow or block. Blocked application will not be allowed to be executed on this PC. A firewall will help protect a computer on a wireless network, but will not restrict access to the network itself. You security on wireless network, you should configure your wireless network to use a network key using either Wi-Fi Protected Access (WPA) or wired equivalent privacy (WEP). For more information, consult the manual for your wireless networking devices.
3. Internet Filter:
Anti Phishing, Anti banner and Bad Website blocking : This feature protects the incoming web traffic and prevents denagerous scripts and urls from being browsed on your PC. You can also add your urls by domain name or any sub-string if you want.
Anti-Banner: blocks advertising information located on banners, built into interfaces of various programs installed on your computer, or displayed online, mostly in browsers. Not only are banner ads devoid of useful information but they also distract you from your work and increase the amount of traffic on your computer.
Anti-Phishing: protects you from phishing. Phishing generally consists of e-mails from fake financial institutions that contain links to their websites which look alike some genuine bank or financial institution. . The message text convinces the reader to click the link and enter confidential information in the window that follows, for example, a credit card number or a login and password or an Internet banking site where financial operations can be carried out.
Bad Website blocking: The module is designed to provide safe Internet surfing by restricting access to unsecure web resources, websites which have been considered as suspicious or phishing.
4. Email Scan: Scans all incoming and outgoing messages and their attachements. Pop3, SMTP, IMAP, MAPI and NNTP protocols are supported.
![]() |
Protect - Confidential information, files & documents | |
![]() |
Prevent - Data and identity theft | |
![]() |
Preserve – Network bandwidth for faster access & productivity | |
![]() |
Personalize- Scans to remove only the items you select | |
![]() |
Proven – To create a faster virus and spyware free network | |
|
|
|
![]() |
|
|
No comments:
Post a Comment