Guest Connected: 95274   Bookmark Us     Contact Us  
Total Shareware
Currently Listed: 244,933 Applications


  •  Utilities - Security Utilities - Access Control Utilities

     



    • Download Now
       
        Link to this page
    • LockDown Millennium

      -  Version  8.1.5
      LockDown Millennium Monitoring Features Include And
      Are Not Limited To:

      Trojan Scanner and Remover

      The LockDown Millennium Trojan Scanner not only
      performs a manual scan for trojan files across your
      drive, it will automatically scan changed folders and
      running processes that start or run on your computer.
      In addition, the Trojan Scanner allows you to
      configure email warning messages that are sent to
      another computer when trojans are detected. Regular
      Trojan signature updates are given our utmost priority
      to ensure that you stay protected from all of the
      newest and latest Trojan threats. By default, Trojan
      file signatures are updated automatically and a scan
      with the new signatures is initiated on all running
      processes. Our Trojan analysis department is
      constantly gathering new Trojan specimens from the
      wild and has been instrumental in bringing many new
      threats to light. We are always happy to accept new
      specimens or variants for analysis to broaden the
      level of protection we are able to offer our clients.

      Generics Monitor

      The generics module in LockDown Millennium will detect
      Internet Servers without blocking your Internet
      connections. You can view and remove all startup
      programs from a single window. This includes programs
      starting up from the system registry, configuration
      files and even third party programs, such as ICQ.
      Since most Trojans infecting your system will need to
      startup after you reboot, LockDown Millennium has
      every known startup method covered with an easy popup
      window warning message to undo any changes the moment
      they occur. The Internet Servers window is also
      included which displays all Internet programs
      currently running in memory. Unknown trojans can
      easily be detected by closing all of your Internet
      programs and viewing this window. If the user was to
      execute an unknown / undetectable trojan on his
      computer, this is what he would see: 1. A popup
      message indicating that a program was added to startup
      and an option to undo it. 2. A second popup warning
      that a new Internet untrusted server is running and
      options to remove it from startup (if it has a startup
      method). There are also options to kill the server,
      autokill it in the future or add it to the trusted
      list. 3.The Trojan scanner program will also detect
      and remove it, if it is a currently known trojan.

      Port Monitor

      You can monitor your choice of Trojan and known ports
      or all 65,535 ports on your computer. Users can add
      custom ports to monitor or remove any port of their
      choice. An option for port range has also been added,
      so that you can monitor a range of ports under one
      description or send an email notifying of the
      connection for common programs used on the machine,
      such as, PCAnywhere or other authorized remote access
      programs. Each connecting IP address is automatically
      saved to a connection window, for easy tracing
      options.

      Connection Monitor

      With the Connection Monitor you can see every
      connection being made to your computer in both TCP and
      UDP protocols. Connections can be viewed either by IP
      address or by hostname making it easy to trace obvious
      legitimate connections to websites as well as none
      legitimate connections. It displays and logs all of
      the connecting IP addresses for each port and also
      lists all listening ports. Warning options include pop
      up window or sound on new connections and a custom
      refresh rate.

      Process Monitor

      The Process Monitor displays every running program on
      your computer, including hidden trojan programs. This
      is extremely important because most Trojans are
      invisible to Windows and the Windows task manager. The
      Process Monitor also displays the complete path of
      every running program and every DLL file and module
      used by the program. It even identifies whether or not
      the program is capable of using the Internet. If you
      desire, you can also right click on a program listing
      of your choice and "end task" for an effective kill of
      the running program.

      Share Monitor and Blocker

      With the LockDown Millennium Share Monitor you can
      allow or deny access to network shares and report
      problems that may exist in your shares configuration.
      You can also monitor each individuals activity that
      has authorized access to a fileshare on your computer.
      You can configure warning levels based on the incoming
      IP address for allowed users and configure your shares
      and passwords from the LockDown Millennium Shares
      menu. The Share Monitor will also log accessed files
      and failed connection attempts.

      Net Utilities

      The LockDown Millennium Net Utils allows you to find
      detailed information about an IP address or domain
      name that is attempting to connect to your computer.
      The featured programs include: Trace Route, WhoIs,
      Finger, Ping and NsLookup. The information gathered by
      these tools is required when making complaints to
      Internet Service Providers (ISP's) in support of
      complaints regarding hacking attempts and port
      probing. The evidence obtained by these tools has long
      been regarded as an industry standard.

    Program Details
    Publisher Name
    LockDown Corp..
    Software Home Page
    Platforms
    Windows 95/98/NT/2000
    File Size
    1965 KB
    File Date
    5/24/2001
    License
    Commercial Demo
    Price
    $39.95
    Expires On
    1/1/1900
    Expires After
    10
    Other Expiration Info
    Expiration Unknown
    Install/Uninstall Support
    Install & Uninstall
    Record Update
    5/24/2001