LinkScanner Pro extends the capabilities of your firewall to ensure that the actual data passing through the firewall is checked for exploits and other security breaches.
Block threats permitted through your firewall | | 
Real-time exploit blocking | Once a program has access to the Internet, it can do anything—including allowing hackers to hitch a ride.
Hackers can simply sail through the firewall unchallenged, because they're riding along with a trusted application.
LinkScanner Pro provides real-time analysis of network traffic and web site content to stop exploits and malicious content automatically.
| | | | |
| Secure vulnerable Web-connected applications |
Always-on connection monitoring
| | As more applications need to communicate with the Internet to work properly (such as web browsers, media players, word processors), a vulnerability in any creates an opportunity to bypass traditional security products.
LinkScanner Pro monitors open Internet connections and secures vulnerabilities until the software's manufacturer can release a patch.
| | | |
Avoid threats as you search & browse the Web |
Integrates with search engines
- scans results automatically. | LinkScanner Pro inspects each web page when you visit for exploits, hacked pages and malicious lures.
It also integrates with major search engines to check search results before you visit; a color-coded icon appears alongside each listing, so you get advance warning of poisoned sites and can steer clear of active threats.
| | With LinkScanner Pro, Web-connected programs are safe and Internet data entering your PC is monitored for exploits and other security breaches.
- Expand your threat protection
- Plug holes in Web-connected programs
- Block attacks as you search and browse
- Set & forget ease of use—no rules, no recurring system scans
Even a properly configured firewall can unknowingly permit dangerous traffic onto your machine. Hackers can bypass firewalls by hiding within legitimate traffic your firewall must allow for programs to work. Simply visiting a bad, hacked Web page can then expose your machine. Vulnerabilities and exploits like WMF, VML, CreateText Range and setSlice have, and continue to, spread rootkits and open backdoors on computers around the world.
With over 50 million active Web sites, many of which change and update their content from hour to hour, you need a real-time solution to detect threats and keep your PC out of trouble.
System Requirements
- Pentium 1.2 GHz or higher
- 256 MB RAM
- Microsoft Windows 2000, Windows XP Home & XP Professional, Microsoft Vista
- Broadband recommended; works with modem dial-up
- Compatible with major anti-virus, anti-spyware, and firewall products
|