Print

Previous

Next

Overview of How You are Protected

This table gives you a synopsis of how ZoneAlarm browser security works to secure the safety of your credit card numbers, social security numbers, passwords, and personal information such as address and phone numbers.

Feature

How it Protects You

Turning on this feature

Keylogger and screen grabber blocking plus encryption that hides your typing from keyloggers*

Blocks programs that secretly record your screen or your typing in order to steal your personal information.

Doesn’t have to scan for keyloggers and screen grabbers. Instead, blocks the processes they use. Also, special encryption ensures that only the intended program (e.g., your Web browser) can read your keystrokes.

On by default .*

Virtualization*

Creates a virtual temporary file system to trap and stop uninvited programs (known as drive-by downloads) that attempt to track information about you. See What are Drive-by Downloads and Botnets?

See also Virtualization: A Defense Shield*.

See Turning Virtualization On*.

 

Spy site detection

Prevents spying mechanisms and sites that distribute spyware from stealing your information.

On by default.

 

Advanced download protection*

Multiple-levels of scanning and heuristics are available to determine the safety of files you download from the Web.

See How Advanced Download Protection* Works.

On by default.*

 

Dual-engine phishing site detection

Prevents you from entering valuable data on a fraudulent site that was designed to steal from you. Signature and heuristic detection are used to detect even unreported phishing sites as they are created -- no need to wait for signature databases to discover them.

On by default.

 

Web site safety checking and rating

Warnings alert you if you surf to a questionable or known dangerous site.

Click the Site Check button in the ZoneAlarm Security toolbar for details about the security level of any site.

On by default.

Privacy Browser mode*

Prevents anyone who uses the same computer from seeing personal information you typed in online forms and fields. See Using Private Browser: Leaving No Trace*.

Click Private Browser in the toolbar before you start surfing.*

In This Section

Virtualization: A Defense Shield*

Understanding Phishing, Drive-bys, and Other Threats

How Advanced Download Protection* Works

How Dangerous Site Detection Works

How Stealth Actions are Blocked*

See Also

Understanding the Threats and Your Protections

 
©2011 Check Point Software Technologies Ltd. All rights reserved.