graphic DefenseWall - Day-to-Day Use
  



Using DefenseWall - day to day

Once you have DefenseWall up and running, please take a moment to read the topics in the FAQ chapter. The information found there is useful, particularly, Installing Software.

You have already added any other threat gateway applications you are using that may not be on the Default Untrusted list, by following the instructions in Setup & Preferences.  Now, we'll explain how easy it is to go about using your computer every day with DefenseWall.

DefenseWall identifies applications and processes in two ways:
Trusted (safe)  or  Untrusted (possible threat) 

DefenseWall considers all applications that interact with the internet to be Untrusted threat gateways and new applications and files that you view or download via these threat gateways to be Untrusted also, for maximum safety.  

Your browser, email client, media player, IM/chat, P2P client, download manager, etc. (from known, reputable sources) are trustworthy application files, in and of themselves, from the author or vendor. However, because they connect to the internet, these threat gateways are considered Untrusted applications while running.

For example
You have downloaded Firefox Browser from Mozilla.org.  Being a trustworthy author/vendor and the file itself trustworthy, install it as Trusted

However, it must run as Untrusted when it connects to the internet because a Browser is a threat gateway.  Firefox is a Default Untrusted application and will be automatically added to the Untrusted Applications list and automatically run Untrusted.

Note:  the following Untrusted applications will update in their default untrusted state - Mozilla Firefox, SeaMonkey, Thunderbird, Opera(old), Internet Explorer, uTorrent and ICQ.

Important Note:  Some programs, such as browsers (threat gateway), finish installation and, still in the install routine, ask if you want to connect online now.  The application is in a Trusted state and should be closed.  Restart will be initiated Untrusted, if it is within the Default Built-in List of Untrusted Applications.

· If you consider a file or application you want to install to be itself fully Trusted, it must be installed as Trusted.  Quick method: use the Windows Explorer Context Menu - Run as trusted.  You can also change the file to Trusted via the context menu.

· If it is a typical threat-gateway but not in the Default Built-in Untrusted List database, go to the Untrusted Applications tab - Add - Add application.  The Windows directory will open; navigate to the location of the program; select the program executable file (.exe) - Open - Apply!

· To install a downloaded application that runs locally on your computer that is fully trusted and not considered a threat gateway, please see the Installing Software topic.  (Quick method: use the Windows Explorer Context Menu - Run as trusted.)  

· If you want to use a downloaded, non-installing executable file or portable application (non-install) which is fully trusted and is not a threat-gateway type application, remove it from the Untrusted Applications List or use the  Windows Explorer Context Menu - Change status to trusted.

If that non-install application or file is a threat-gateway (browser, email client, IM/chat, media player, P2P client, download manager, Reader, etc.), just start it - it will run Untrusted.

Compressed files (zip, rar, etc) are automatically Untrusted.  Do not run directly from the zip folder or archive.  Extract files and follow the above procedures after extracting.


Reminder
After selecting actions to perform, click the Apply button which is now active.

graphic
OK closes the program interface back to the system tray.


The one thing to keep in mind:
DefenseWall considers applications and files received/downloaded via Untrusted threat gateways to be potentially harmful and sets them as Untrusted and, as is, they cannot harm your system.  DefenseWall automatically adds them to the Untrusted Applications List
 

graphic  Get More Help  


graphic

Copyright  © 2004-2015    SoftSphere Technologies
All Worldwide Rights Reserved