Print

Previous

Next

How Stealth Actions are Blocked*

Some Web sites and Web downloads silently put programs on your computer that record what you type or take pictures of your screen for theft purposes. Some make changes to your computer registry files, and some just download uninvited junk that takes up space.

ZoneAlarm browser security blocks the stealth actions by blocking the following:

  • Keyloggers—two layers of protection: Keyloggers are a common type of spyware that records your keyboard input. ZoneAlarm browser security encrypts everything you type so that only the intended application can read your keystrokes. Malicious programs are unable to see them.

Note - Keyloggers are sometimes employed for useful tools like language translation or volume control at Web sites. For this reason, if you prefer to have keyloggers blocked only when you are completing a secure "https" Web transaction, such as at a secure banking or shopping site, you can set this in the Settings panel. See ZoneAlarm browser security Settings Panel.

  • Screen grabbers: ZoneAlarm browser security turns off processes used by screen grabbers so that they produce only blank screen shots. A screen grabber is another type of program designed to steal information from you. It silently takes pictures of your screen and retrieves them via the Internet. If you are entering personal data in online Web forms, that information could be captured and used for identity theft or other theft.
  • Uninvited "drive-by" downloads: ZoneAlarm browser security catches invisible, drive-by downloads and neutralizes them in a virtual file system where they cannot touch your real computer disk. This provides a strong layer of insulation from malicious programs and junk that attempt to get onto your computer through security holes.

In This Section

Overview of How You are Protected

Virtualization: A Defense Shield*

Understanding Phishing, Drive-bys, and Other Threats

How Advanced Download Protection* Works

How Dangerous Site Detection Works

See Also

Understanding the Threats and Your Protections

 
©2011 Check Point Software Technologies Ltd. All rights reserved.