ACRONIS Internet Security Suite 2010, 10+1 Pcs. User's Guide Page 199

  • Download
  • Add to my manuals
  • Print
  • Page
    / 318
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 198
You can create rules to protect any piece of information you might consider personal
or confidential, from your phone number or e-mail address to your bank account
information. Multiuser support is provided so that users logging on to different
Windows user accounts can configure and use their own identity protection rules.
If your Windows account is an administrator account, the rules you create can be
configured to also apply when other users of the computer are logged on to their
Windows user accounts.
Why use Identity Control?
Identity Control is very effective in blocking keylogger spyware. This type of
malicious applications records your keystrokes and sends them over the Internet
to a malicious person (hacker). The hacker can find out sensitive information from
the stolen data, such as bank account numbers and passwords, and use it to gain
personal benefits.
Supposing such an application manages to avoid antivirus detection, it cannot
send the stolen data by e-mail, web or instant messages if you have created
appropriate identity protection rules.
Identity Control can protect you from phishing attempts (attempts to steal personal
information). The most common phishing attempts make use of a deceiving e-mail
to trick you into submitting personal information on a fake web page.
For example, you may receive an e-mail claiming to be from your bank and
requesting you to urgently update your bank account information. The e-mail
provides you with a link to the web page where you must provide your personal
information. Although they seem to be legitimate, the e-mail and the web page
the misleading link directs you to are fake. If you click the link in the e-mail and
submit your personal information on the fake web page, you will disclose this
information to the malicious persons who organized the phishing attempt.
If appropriate identity protection rules are in place, you cannot submit personal
information (such as your credit card number) on a web page unless you have
explicitly defined an exception for the respective web page.
To configure Identity Control, go to Privacy Control>Identity in Expert Mode.
Privacy Control
189
Page view 198
1 2 ... 194 195 196 197 198 199 200 201 202 203 204 ... 317 318

Comments to this Manuals

No comments