LockDown Millennium - Version 8.1.5 LockDown Millennium Monitoring Features Include And Are Not Limited To:Trojan Scanner and RemoverThe LockDown Millennium Trojan Scanner not only performs a manual scan for trojan files across your drive, it will automatically scan changed folders and running processes that start or run on your computer. In addition, the Trojan Scanner allows you to configure email warning messages that are sent to another computer when trojans are detected. Regular Trojan signature updates are given our utmost priority to ensure that you stay protected from all of the newest and latest Trojan threats. By default, Trojan file signatures are updated automatically and a scan with the new signatures is initiated on all running processes. Our Trojan analysis department is constantly gathering new Trojan specimens from the wild and has been instrumental in bringing many new threats to light. We are always happy to accept new specimens or variants for analysis to broaden the level of protection we are able to offer our clients.Generics MonitorThe generics module in LockDown Millennium will detect Internet Servers without blocking your Internet connections. You can view and remove all startup programs from a single window. This includes programs starting up from the system registry, configuration files and even third party programs, such as ICQ. Since most Trojans infecting your system will need to startup after you reboot, LockDown Millennium has every known startup method covered with an easy popup window warning message to undo any changes the moment they occur. The Internet Servers window is also included which displays all Internet programs currently running in memory. Unknown trojans can easily be detected by closing all of your Internet programs and viewing this window. If the user was to execute an unknown / undetectable trojan on his computer, this is what he would see: 1. A popup message indicating that a program was added to startup and an option to undo it. 2. A second popup warning that a new Internet untrusted server is running and options to remove it from startup (if it has a startup method). There are also options to kill the server, autokill it in the future or add it to the trusted list. 3.The Trojan scanner program will also detect and remove it, if it is a currently known trojan. Port MonitorYou can monitor your choice of Trojan and known ports or all 65,535 ports on your computer. Users can add custom ports to monitor or remove any port of their choice. An option for port range has also been added, so that you can monitor a range of ports under one description or send an email notifying of the connection for common programs used on the machine, such as, PCAnywhere or other authorized remote access programs. Each connecting IP address is automatically saved to a connection window, for easy tracing options. Connection Monitor With the Connection Monitor you can see every connection being made to your computer in both TCP and UDP protocols. Connections can be viewed either by IP address or by hostname making it easy to trace obvious legitimate connections to websites as well as none legitimate connections. It displays and logs all of the connecting IP addresses for each port and also lists all listening ports. Warning options include pop up window or sound on new connections and a custom refresh rate.Process Monitor The Process Monitor displays every running program on your computer, including hidden trojan programs. This is extremely important because most Trojans are invisible to Windows and the Windows task manager. The Process Monitor also displays the complete path of every running program and every DLL file and module used by the program. It even identifies whether or not the program is capable of using the Internet. If you desire, you can also right click on a program listing of your choice and "end task" for an effective kill of the running program. Share Monitor and Blocker With the LockDown Millennium Share Monitor you can allow or deny access to network shares and report problems that may exist in your shares configuration. You can also monitor each individuals activity that has authorized access to a fileshare on your computer. You can configure warning levels based on the incoming IP address for allowed users and configure your shares and passwords from the LockDown Millennium Shares menu. The Share Monitor will also log accessed files and failed connection attempts. Net UtilitiesThe LockDown Millennium Net Utils allows you to find detailed information about an IP address or domain name that is attempting to connect to your computer. The featured programs include: Trace Route, WhoIs, Finger, Ping and NsLookup. The information gathered by these tools is required when making complaints to Internet Service Providers (ISP's) in support of complaints regarding hacking attempts and port probing. The evidence obtained by these tools has long been regarded as an industry standard.