Telebec
INTERNET, Do business in the fast line

Yellow Pages Canada 411

 

FAQ - Internet Security Services

More info |  Print  | Send


Anti-Spyware
What is spyware?

Spyware are small computer programs that install on your computer in order to acquire personal information without your knowledge. Once installed, these small parasite programs record specific information, such as credit card numbers, passwords or favourite web pages... The information can then be forwarded to companies which will use it to offer you targeted services or products. In addition to threatening your privacy, spyware can sometimes slow your computer's processing speed considerably.



How does spyware get onto my computer?

Contamination can occur:
- via e-mail attachments
- by sharing files
- when installing new software



What kind of scans does Anti-Spyware offer?

a) On-demand, full or fast scan (manual scan)
b) Real-time scan (can be configured to run in the background)
c) Scheduled scans (using scheduled scanning feature)



How often is it advised that I search for spyware on my workstation?

In addition to activating the real-time protection, we recommend that you perform a manual scan of your workstation every week. This way, you will enjoy the best protection available.

We also recommend that you schedule a weekly scan of your workstation and its hard drives.



Does the Anti-Spyware service remove the spyware or does it only quarantine it?

The Anti-Spyware service quarantines the programs it has detected while scanning your workstation so that you can decide what to do with them later. You can either remove the programs completely or reinstall them with the Anti-Spyware. The log will give you all the details on the spyware that has been quarantined or removed. The quarantined spyware is no longer a risk for your workstation.



Does the Anti-Spyware service provide “real-time” detection of spyware?

Yes, the Anti-Spyware service allows continuous scanning of your workstation in the background. When this feature is activated, you can decide what the Anti-Spyware should do when it detects spyware (ex.: remove the spyware).



What is the difference between anti-spyware, antivirus, and a firewall?

The Firewall protects you by preventing identification of the open ports on your workstation and by blocking unauthorized intrusion attempts.

The Antivirus tool prevents your workstation from being infected by computer viruses. However, Firewall and Antivirus protection will not prevent your workstation from being infected by spyware without your knowledge. You need Anti-Spyware for this.

Finally, the Anti-Spyware service cannot remove computer viruses.



What are the benefits of using anti-spyware?

The Anti-Spyware service will keep your personal information private by removing the software that is monitoring your Web browsing habits. Since spyware often slows down your workstation, removing it will speed up your workstation.



What does the pop-up blocker that comes with the Anti-Spyware consist of?

The Anti-Spyware tool comes with a pop-up blocker that you can activate as needed. The list of Web sites for which pop-ups are blocked can be viewed and modified at any time.



Does the Anti-Spyware block cookies too?

Yes, the Anti-Spyware tool blocks any attempts to install a cookie on your workstation. The Anti-Spyware application provides a log of attempts.



What is a Trojan?

These programs (also called Trojan horses) allow hackers to remotely control a user’s workstation.



Can I choose the language for the Anti-Spyware?

Yes, you can change the language in the Anti-Spyware’s preferences.


Antivirus
What is malicious logic?

Malicious logic is a small and particularly dangerous program. It is specifically created to cause significant damage to computer systems. Most computer viruses, worms and Trojan horses are considered malicious logic.



What is a virus?

A virus is a small program that spreads by replicating itself. Like its biological counterpart, it cannot survive on its own. It must therefore attach itself to an object in the system to replicate and survive. It self-executes and often inserts its own code in an existing program on your workstation in order to change it. It is activated when you open or run a file of the program or object carrying the virus.

A virus can be benign or very harmful, ranging from the display of an innocuous message to reformatting your hard disk, thereby erasing all of its contents.



How does the Antivirus tool work?

The Antivirus tool included with Internet Security Services is a protection system that automatically stops, in real time, virus and malicious logic attacks through e-mail, the Internet, or removable media, such as a CD-ROM.

The Antivirus module lets you modify the main protection settings yourself, such as the level of protection, e-mail scanning and scheduled scanning. You can view scanning reports or you can research viruses manually.



What scanning options does the Antivirus tool offer?

a) Real-time scanning (continuous scanning in the background)
b) Scanning on demand (manual scanning)
c) Scan scheduling (using the scheduled scan feature)



Will the Antivirus tool scan my e-mail?

Yes. The Antivirus tool will analyze the attachments to your incoming and outgoing e-mail to protect your workstation against viruses, worms and Trojan horses.

You can specify the types of attachments to scan, exclude certain file extensions (ex.: *.html), choose the type of action to take for an infected attachment (ex.: clean, remove or no action) and request a report of detected viruses.



What happens when a virus is detected in an e-mail attachment?

When it detects a virus, the Antivirus tool will disinfect it or remove it from your e-mail. The information on the detected virus is available in the detected viruses analysis report.



Does the Antivirus tool warn me when an e-mail I am sending is infected with a virus?

Yes. If the real-time Antivirus protection has been activated and you have selected “Block” the sending of infected e-mail, the e-mail will automatically be blocked and will not be sent.



Does the Antivirus tool keep a log of scans done on my workstations?

Yes, a log of your scans is kept. This log will provide you with the details on files that have been disinfected or removed.



Can I use the Internet Security Services Antivirus tool at the same time as another antivirus program?

It is recommended that you use only one Antivirus program, because duplicate scanning of the files on your workstation would require more computing power. The processing speed would be slower and your workstation could become unstable.


Firewall
What is a firewall?

A firewall controls access to the applications installed on your workstation, and specifically prevents Trojan horse attacks, which are harmful programs that can breach your system and allow a hacker to gain control of your system remotely. The firewall also lets you detect and prevent the opening of applications on your workstation that you have not authorized to connect to the Internet.



Why do I need a firewall?

Any workstation connected to the Internet can be the victim of a hacker attack. Hackers scan the Internet by randomly sending packets of data in search of connected machines. When one is found, they look for a security flaw on the machine so they can gain access to its data, such as credit card numbers, passwords and any private files.

A machine that is permanently connected is at much greater risk, because it is often left unattended. So, companies and web surfers who have a cable or ADSL type connection should protect themselves from network intrusions by installing a firewall protection tool.



What features does the Internet Security Services Firewall include?

The Internet Security Services Firewall includes:

  • The firewall itself, which monitors traffic;
  • Application control which enables you to allow some applications to access incoming and outgoing network traffic;
  • Prevention of intrusions on your workstation;
  • Remote access control (alert when there is an attempt to disconnect or connect to Internet);
Logging, which provides ongoing access to information gathered on network traffic.

Automatic Dialer Control
Does Internet Security Services protect me against automatic dialers?

Yes, Internet Security Services have a remote access control module that protects your workstation against malicious programs (malware) that try to close the current Internet connection and dial telephone numbers to attempt to establish a connection that is billed by the minute at a price that is often very high.

This module lets you accept or refuse these connection attempts and update your list of permitted and unauthorized telephone numbers.


Content Blocker
Can my children find out that I am using Content Blocker?

Yes. When a child attempts to access an inappropriate Web site, a Web page pops up to advise him that Content Blocker is blocking access to this site.


How can I be sure that Content Blocker is protecting my family?

Content Blocker lets you block, at the source, any Web sites you choose that have gambling, money, hate, drug, sex and/or weapons-related content. The search tools will not permit the display of a list of sites matching these criteria, and all Web sites that match these criteria will be blocked. A Web page will pop up telling the surfer that Content Blocker is blocking the search or site.

Content Blocker lets you view the list of blocked sites and determine which Web sites or pages are authorized or refused.

In addition, Content Blocker lets you set a time period when the Internet use is not permitted. A message on screen will notify that surfing is not allowed before the hour scheduled in the application.


Can my children access the Content Blocker filtering criteria?

The Content Blocker settings are protected by a password that you create when you configure the application. You can set the Content Blocker to require the password every time, or to allow access for the duration of a session on the workstation (the password only has to be entered once).

The password should not be written down anywhere, it should not be a known name, a birthday, or any other word that your children might easily guess. Ideally, the password should consist of at least eight characters made up of letters and numbers.




F-Secure Logo

F-Secure and the triangle symbol are registered trademarks of F-Secure Corporation used under licence, and F‑Secure product names and symbols/logos are either trademarks or registered trademarks of F-Secure Corporation.

Télébec, Limited Partnership is not responsible for any damage that might be caused to your computer (including software and data) following installation of Internet Security Services. Your computer must also meet certain prerequisites for installation of the software. Technical support from Télébec, Limited Partnership is limited to the Internet Security Services applications.