Check Point throws ForceField around browser
By Stuart Turton
Posted on 24 Sep 2007 at 16:25
Check Point has launched a beta of its Zone Alarm ForceField software, a new product designed to protect users against browser-based exploits including phishing and keyloggers.
ForceField has been designed specifically to protect the browser and all actions that occur within it, meaning it will not detect or remove any malware already on the system or brought in by any other method, leaving protection of the operating system firmly in the hands of existing antivirus software.
ForceField works by creating a virtual browser isolated from the machine it is running on. Malware and exploits then fail because they have no access to the computer's files or Registry.
In practice the user will notice little difference when surfing the internet on the virtual browser, besides it taking slightly longer to open certain pages and a glowing white aura around windows to indicate the software is activated. ForceField appears as a new toolbar within your PC's existing browser - either Internet Explorer or Firefox - with all your regular bookmarks and extensions left in place.
A message at the top of the page warns the user of dangerous sites, but doesn't block you from accessing them, while downloads are scrutinised against a database of more than 200,000 known dangerous downloads.
A privacy mode, accessed through the browser's toolbar, wipes all cookies, history and auto-fill and auto-completion information when the browser is closed.
ForceField beta is currently available for trial, with the final version expected in early 2008 for $29.95.
Is your business a social business? For helpful info and tips visit our hub.
- Windows 8.1 Update: an abject surrender
- The insane economics of Sky Now TV
- No such thing as a free app... so pay up if you want quality
- Time to outlaw crapware-laden installers
- Windows Phone 8.1 video: hands-on
- Office for iPad: key information
- Why every PC buyer owes Richard Durkin a debt of gratitude
- HTC One M8 vs Samsung Galaxy S5: 2014's big-hitters compared
- Windows XP end of life: key information
- Cut out the broadband jargon? What jargon?
- Small steps into handling Big Data
- Nexus 5: does it really run stock Android?
- How to get broadband to a garden office
- How to write your company's IT security policy
- Raspberry Pi and Wolfram: a must-have for every child
- Could you get by with Office Web Apps?
- The best Android antivirus apps for 2014
- Headings vs headers: how to use both in Word
- Windows Server 2012 R2: how the Datacenter edition could change SMBs
- Invoices and VAT: how to set up your documents correctly