|
LockDown Millennium
-
Version
8.1.5
LockDown Millennium Monitoring Features Include And
Are Not Limited To:
Trojan Scanner and Remover
The LockDown Millennium Trojan Scanner not only
performs a manual scan for trojan files across your
drive, it will automatically scan changed folders and
running processes that start or run on your computer.
In addition, the Trojan Scanner allows you to
configure email warning messages that are sent to
another computer when trojans are detected. Regular
Trojan signature updates are given our utmost priority
to ensure that you stay protected from all of the
newest and latest Trojan threats. By default, Trojan
file signatures are updated automatically and a scan
with the new signatures is initiated on all running
processes. Our Trojan analysis department is
constantly gathering new Trojan specimens from the
wild and has been instrumental in bringing many new
threats to light. We are always happy to accept new
specimens or variants for analysis to broaden the
level of protection we are able to offer our clients.
Generics Monitor
The generics module in LockDown Millennium will detect
Internet Servers without blocking your Internet
connections. You can view and remove all startup
programs from a single window. This includes programs
starting up from the system registry, configuration
files and even third party programs, such as ICQ.
Since most Trojans infecting your system will need to
startup after you reboot, LockDown Millennium has
every known startup method covered with an easy popup
window warning message to undo any changes the moment
they occur. The Internet Servers window is also
included which displays all Internet programs
currently running in memory. Unknown trojans can
easily be detected by closing all of your Internet
programs and viewing this window. If the user was to
execute an unknown / undetectable trojan on his
computer, this is what he would see: 1. A popup
message indicating that a program was added to startup
and an option to undo it. 2. A second popup warning
that a new Internet untrusted server is running and
options to remove it from startup (if it has a startup
method). There are also options to kill the server,
autokill it in the future or add it to the trusted
list. 3.The Trojan scanner program will also detect
and remove it, if it is a currently known trojan.
Port Monitor
You can monitor your choice of Trojan and known ports
or all 65,535 ports on your computer. Users can add
custom ports to monitor or remove any port of their
choice. An option for port range has also been added,
so that you can monitor a range of ports under one
description or send an email notifying of the
connection for common programs used on the machine,
such as, PCAnywhere or other authorized remote access
programs. Each connecting IP address is automatically
saved to a connection window, for easy tracing
options.
Connection Monitor
With the Connection Monitor you can see every
connection being made to your computer in both TCP and
UDP protocols. Connections can be viewed either by IP
address or by hostname making it easy to trace obvious
legitimate connections to websites as well as none
legitimate connections. It displays and logs all of
the connecting IP addresses for each port and also
lists all listening ports. Warning options include pop
up window or sound on new connections and a custom
refresh rate.
Process Monitor
The Process Monitor displays every running program on
your computer, including hidden trojan programs. This
is extremely important because most Trojans are
invisible to Windows and the Windows task manager. The
Process Monitor also displays the complete path of
every running program and every DLL file and module
used by the program. It even identifies whether or not
the program is capable of using the Internet. If you
desire, you can also right click on a program listing
of your choice and "end task" for an effective kill of
the running program.
Share Monitor and Blocker
With the LockDown Millennium Share Monitor you can
allow or deny access to network shares and report
problems that may exist in your shares configuration.
You can also monitor each individuals activity that
has authorized access to a fileshare on your computer.
You can configure warning levels based on the incoming
IP address for allowed users and configure your shares
and passwords from the LockDown Millennium Shares
menu. The Share Monitor will also log accessed files
and failed connection attempts.
Net Utilities
The LockDown Millennium Net Utils allows you to find
detailed information about an IP address or domain
name that is attempting to connect to your computer.
The featured programs include: Trace Route, WhoIs,
Finger, Ping and NsLookup. The information gathered by
these tools is required when making complaints to
Internet Service Providers (ISP's) in support of
complaints regarding hacking attempts and port
probing. The evidence obtained by these tools has long
been regarded as an industry standard.
|