SOFTWIN Total Security 2011, RNW, DE, 5u, 1Y User's Guide Page 126

  • Download
  • Add to my manuals
  • Print
  • Page
    / 263
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 125
Identity Control is very effective in blocking keylogger spyware. This type of
malicious applications records your keystrokes and sends them over the Internet
to a malicious person (hacker). The hacker can find out sensitive information from
the stolen data, such as bank account numbers and passwords, and use it to gain
personal benefits.
Supposing such an application manages to avoid antivirus detection, it cannot
send the stolen data by e-mail, web or instant messages if you have created
appropriate identity protection rules.
Identity Control can protect you from phishing attempts (attempts to steal personal
information). The most common phishing attempts make use of a deceiving e-mail
to trick you into submitting personal information on a fake web page.
For example, you may receive an e-mail claiming to be from your bank and
requesting you to urgently update your bank account information. The e-mail
provides you with a link to the web page where you must provide your personal
information. Although they seem to be legitimate, the e-mail and the web page
the misleading link directs you to are fake. If you click the link in the e-mail and
submit your personal information on the fake web page, you will disclose this
information to the malicious persons who organized the phishing attempt.
If appropriate identity protection rules are in place, you cannot submit personal
information (such as your credit card number) on a web page unless you have
explicitly defined an exception for the respective web page.
Using Identity Control rules, you can prevent your children from giving out personal
information (such as the home address or phone number) to people they met on
the Internet. Moreover, if you create rules to protect your credit card, they cannot
use it to buy things online without your consent.
20.2.2. Configuring Identity Control
If you want to use Identity Control, follow these steps:
1. Open BitDefender, click Options in the upper-right corner of the window and
choose Expert View.
2. Go to Privacy Control > Identity.
3. Make sure Identity Control is enabled.
Note
If the option cannot be configured, go to the Status tab and enable Privacy Control.
4. Create rules to protect your sensitive data. For more information, please refer to
Creating Identity Protection Rules (p. 117).
Privacy Control
116
BitDefender Total Security 2011
Page view 125
1 2 ... 121 122 123 124 125 126 127 128 129 130 131 ... 262 263

Comments to this Manuals

No comments