$pageFile = "index"; $lang = "EN"; require_once "../incs/langs.php" ?>
require "incs/menu.inc"; ?>
|
QUICK GUIDEThank you very much for installing Browser Sentinel. This quick guide enables you to easily get started with Browser Sentinel.
What Audience Does Browser Sentinel Target?
What Browser Sentinel Does And What It Doesn't?
To Delete Or Not To Delete?
System Items
Safe and Blocked Lists
Tags
Data Update
Critical ZonesBHOs. A Browser Helper Object (BHO) is an extension/plugin for Internet Explorer that extends the browser's functionality. It is a DLL module that is loaded by Internet Explorer each time it starts up. Toolbars. A toolbar is an extension/plugin for Internet Explorer that extends the browser's functionality and displays a custom toolbar underneath Internet Explorer's main menu and navigation bar. Explorer Bars. An explorer bar is a panel usually shown on the left of the browser window, e.g. Search, History, Favorites, etc. Apart from displaying various useful information, an explorer bar can also track IE events, modify web page text, open new browser windows, etc. Buttons. An IE toolbar button is an IE extension that adds a new button on the IE toolbar next to the standard buttons (Go Forward, Go Back, etc.). Context Menu Items. A context menu item is a third-party menu item that appears in the Internet Explorer context menu. Tools Menu Items. A Tools Menu item is an entry in the Internet Explorer Tools Menu. The item can execute various actions (starting a program, showing/hiding an explorer bar, etc.) ActiveX. An ActiveX is a component (usually a DLL or an OCX module) that provides better interaction with web site pages than those using only HTML. For instance, an ActiveX control can display video/animation, play sounds, render dynamic 3d graphics, etc. Pages. Default pages (start page, search page, error pages, etc.), search URLs and URL prefixes for Internet Explorer. Startup Programs. A startup program is a program that is started automatically at Windows startup. Running Programs. A running program is a program that is currently loaded in the memory and is executing. Services (not available in 98/ME). A service is an executable application that runs in its own Windows session. A service can be automatically started when the computer boots, can be paused and restarted, and does not show any user interface. Services are used to implement long-running functionality that does not interfere with other users who are working on the same computer. Drivers (not available in 98/ME). A device driver is a component that Windows uses to provide I/O services for and interact with an underlying device, such as a modem or network adapter. Rather than access the device directly, Windows loads device drivers and calls functions in the drivers to carry out actions on the device. The driver functions contain the device-specific code needed to carry out actions on the device. Drivers are sometimes used by various keylogger/spyware software to record system events. Loaded Modules. Loaded modules are dynamic link libraries (DLL files) that are currently loaded in the BrowserSentinel.exe process. This zone is very effective in detecting keylogger software since keyloggers usually inject their DLL files into a process to monitor keystrokes using the Windows hooking technique. Startup Modules. Startup modules are dynamic link libraries (DLL files) that are loaded automatically during Windows startup or later when a particular application starts. Browser Sentinel defines six startup module types: ShellExecute Hook, Shell Delay Load Object, App Init DLL, URL Search Hook, Custom Download Manager and Notification Package. Shell Extensions. A shell extension is a DLL module that extends Windows Explorer functionality. Most shell extensions just add new entries to the Windows Explorer context menu - the menu that appears when you right-click on a file or a folder. HOSTS file. The HOSTS file contains hostnames and their mappings to an IP address. This file is often abused by malicious programs that set up a redirection from certain popular web sites (e.g. Google.com) to web sites they want you to visit. LSPs. An LSP is a piece of software that can be inserted into the chain of data transferring software on your computer. Before data from a web server reaches your web browser, it goes through all the chained software, including installed LSPs. The same is true for outgoing data. Malicious software can use LSPs to see all traffic being transported over your Internet connection. Protocols. An asynchronous pluggable protocol can be used to handle a custom Uniform Resource Locator (URL) protocol scheme, filter data for a designated MIME type or intercept requests transmitted over existing protocols (e.g. http, https, ftp). Sophisticated malware can use this technique to watch your Internet activity. |