Once you have DefenseWall up and running, please take a moment to read the topics
in the FAQ chapter. The information found there is useful, particularly, Installing
You have already added any other threat gateway applications you are using that may
not be on the Default Untrusted list, by following the instructions in Setup &
Preferences. Now, we'll explain how easy it is to go about using your computer every
day with DefenseWall.
DefenseWall identifies applications and processes in two ways:
DefenseWall considers all applications that interact with the internet to be Untrusted
threat gateways and new applications and files that you view or download via these
threat gateways to be Untrusted also, for maximum safety.
Your browser, email client, media player, IM/chat, P2P client, download manager, etc.
(from known, reputable sources) are trustworthy application files, in and of
themselves, from the author or vendor. However, because they connect to the
internet, these threat gateways are considered Untrusted applications while running.
You have downloaded Firefox Browser from Mozilla.org. Being a trustworthy
author/vendor and the file itself trustworthy, install it as Trusted.
However, it must run as Untrusted when it connects to the internet because a Browser
is a threat gateway. Firefox is a Default Untrusted application and will be
automatically added to the Untrusted Applications list and automatically run
Note: the following Untrusted applications will update in their default untrusted state
- Mozilla Firefox, SeaMonkey, Thunderbird, Opera(old), Internet Explorer, uTorrent
Important Note: Some programs, such as browsers (threat gateway), finish
installation and, still in the install routine, ask if you want to connect online now. The
application is in a Trusted state and should be closed. Restart will be initiated
Untrusted, if it is within the Default Built-in List of Untrusted Applications.
· If you consider a file or application you want to install tobeitself fully Trusted, it
must be installedas Trusted. Quick method: use the Windows Explorer Context
Run as trusted. You can also change the file to Trusted via the context menu.
If it is a typical threat-gateway but not in the Default Built-in Untrusted
go to the Untrusted Applications tab - Add - Add application. The Windows directory
will open; navigate to the location of the program; select the program executable file
(.exe) - Open - Apply!
· To install a downloaded application that runs locally on your computer that is fully
trustedandnot considered a threat gateway, please see the Installing Software
topic. (Quick method: use the Windows Explorer Context Menu- Run as trusted.)
· If you want to use a downloaded,non-installing executable fileorportable
application(non-install)which isfully trusted and is not a threat-gateway type
application, remove it from theUntrusted ApplicationsList
or use the Windows
Explorer Context Menu-Change
status to trusted.
If that non-install application or file is a threat-gateway (browser, email client,
IM/chat, media player, P2P client, download manager, Reader, etc.), just start it - it
will run Untrusted.
Compressed files (zip, rar, etc) are automatically Untrusted. Do not run directly from
the zip folder or archive. Extract files and follow the above procedures after
After selecting actions to perform, click the Applybutton which is now active.
OKcloses the program interface back to the system tray.
The one thing to keep in mind:
DefenseWall considers applications and files received/downloaded via Untrusted
threat gateways to be potentially harmful and sets them as Untrusted and, as is, they
cannot harm your system. DefenseWall automatically adds them to the Untrusted