1.
What version of Windows does Identity Protection work
with?
Identity Protection will work with Windows
2000 and XP.
Back to Top
2. What types of vulnerabilities
does Identity Protection detect?
Identity Protection detects and alerts
you of the following vulnerabilities:
- Improper/Insecure registry configurations
- Suspicious open/listening ports
- Open file shares
- Possible trojan installations
- Insecure user configurations
- Insecure password policies
Back to Top
3. How do I decrypt encrypted files?
You must first select the file to decrypt
(either by manually browsing for it, or from the secure
vault) - then browse to the key file you used to encrypt
the file/directory originally. Once you do this simply
click Decrypt to complete the process.
Back to Top
4. Can I update Spyware Cleaner's spyware/adware
database?
Yes, registered users can update the spyware/adware
definitions database by clicking on the update button
within the software.
Back to Top
5. How do I fix a security vulnerability
that Identity Protection found?
If a registry security alert is found
you can choose the 'fix this alert' option within the
alert listed. If an open port is found it is advised
you block this port with a firewall (either via a software
or hardware firewall). More information can be found
on incorrect policies found by clicking on the description/information
URL link under each alert. These pages will give you
more information on how to fix the policy found. If
you have open file shares you can close them by navigating
to the file folder that is being shared and turning
off its file sharing from within its file properties.
Back to Top
|