graphicHow do I install new Software?

Always download software from the source: developer, vendor or authorized reseller.  Avoid file hosting sites where/when possible.

If you have downloaded new software that you consider fully Trusted (there is absolutely no risk in installing it), you have 3 choices for installation:

· If new software installation is from a trusted source, you can Remove it from the Untrusted Applications List and run normally in order for it to install as trusted.
· Don't remove it, use Run as trusted function in Untrusted Applications List dialog window.

 · Quick method: use Windows Explorer Context Menu Integration item.
(Right-click installation file icon - select DefenseWall Run as trusted.)

To now run or open this software or application, please refer to the Day-to-Day Use topic for more detailed information.

Installation can now be executed directly from the Download folder/areas. Please see  Whitelisting topic for more information.

Note the following Untrusted Applications will update in their default state:
Mozilla Firefox, SeaMonkey, Thunderbird, Opera(old), Internet Explorer, uTorrent and ICQ. No need to run as trusted (to update extensions, run as trusted, close and start normally).

If a new software is from a source you do not trust absolutely - first use an anti-virus scanner to check it for malicious content or send it to any anti-virus lab  for more detailed inspection. Online scanners Jotti Malware Scan and Virus Total recommended.

If a new software installation is from an Untrusted source -  install it as Untrusted. Because of the sandbox restrictions in DefenseWall, most software (games, applications, ...) should run okay, some may not.

If you have installed an application as Untrusted by mistake and run it one more time as trusted, it may be turned back to Untrusted because temporary folders and files are already marked as untrusted.  In most cases, you need to uninstall it and cleanup leftover files; then re-install 'as Trusted'.


· Always download software and files from trusted sources!  (80% of files on P2P and file sharing sites are infected.)

· Download software from the author's website whenever possible.  (Using a site that hosts downloads?  Most of those sites list the vendor/author - use a good search engine to find it.)

· Scan all files received via P2P, IM/Chat, E-mail, etc. (threat gateways) before
opening or running.

· Do not open email or attachments from unknown or unsolicited sources!  Never! Delete them!


Copyright  © 2004-2015   SoftSphere Technologies
All Worldwide Rights Reserved