DefenseWall Personal Firewall integrated with DefenseWall HIPS(Host-based
Intrusion Prevention system) protection scheme is 'Isolation'.
Defense itself is based on a 'Sandbox' scheme.
Untrusted processes run within a virtual space - not separated from each other, but
separated from the trusted space on your system, with reduced rights. This is built
upon policy-based restrictions and limited virtualization.
Sandboxing creates amaximum level of protection.
DefenseWall Personal Firewallidentifies processes and applications in two ways:Trusted (safe) or Untrusted (possible
threat). 'Trusted' files are core system
applications and processes that are not dangerous internet content or potentially
Applications and processes which
interact with the internet - 'threat gateways' - pose
a serious risk to your system safety. Hackers use these threat gateways and
applications to penetrate your computer, to auto-run malicious programs, set-up and
run botnets without your knowledge or to infect and alter it, resulting in damage to
your system integrity.
DefenseWall marks these threat gateways and processes as 'Untrusted' and they
operate in an 'isolated' environment. Any files and applications downloaded or
launched through those untrusted gateways are also marked Untrusted - they cannot
harm your system.
DefenseWall prevents untrusted processes from modifying the executables, inter-process communications,
multimedia, documents, phone databases (target for 'dialer'
malware), hosts file, adding or modifying autostart areas (both registry and
file system), adding or modifying drivers/services (targeted by'rootkits'), modifying
the desktop and browser settings, plugins and extensions, setting global hooks (usually
used by 'key loggers'), injecting their code into Trusted Processes, taking screenshots
and many other dangers. DefenseWall will not allow it!
In addition, all potentially dangerous files which are created by Untrusted Processeswill be marked as 'Untrusted'. Any process launched by an untrusted process will be
Untrusted as well. This Untrusted 'attribute inheritance' is required for attachments
and downloaded software from within your browser or other media from the internet.
Furthermore, processes will also be marked as Untrusted according to our internally
maintained 'Untrusted Files' inheritance ruleset. For more information please see Untrusted Applications.
Data Theft Protection!
Potentially dangerous actions will be blocked without a multitude of annoying pop-ups
seen with other intrusion prevention programs. There are a few, vital exceptions - DefenseWall will give you an alarm notification for Advanced
Key Loggers, Disabled
Protection and Resource Protection issues. Unwanted or potentially dangerous
actions are stopped 'dead in it's tracks'. Your personal information is immediately
Lock up your data!
DefenseWall prevents Untrusted processes from accessing Secured files and folders.
You can add any files or folders to prevent your sensitive data from being accessed or
stolen by malware.
Plugin Injection Protection!
If a process loads a Dynamic-Link Library(DLL) - a file within a program which is called
to execute an action - and this module is created by an Untrusted process, this process
is also marked as Untrusted. This prevents any possibility of escape from the
Untrusted Process Area.
Full System Protection!
DefenseWall does not allow untrusted processes to break your system integrity or to
break out of the Virtual Untrusted Processes Area.
If malicious software has entered your system via any threat gateway application, it
will not be able to install itself properlyonto your system, to steal important files or
break through the Untrusted process Virtual Border.
If you notice that a suspicious file or process is attempting to run, you may terminate it
with the handy Big Red Button(Stop Attack).