Infiltrator

Infiltrator is a powerful network security suite that can scan your entire network for vulnerabilities, exploits, weak links, and audit each computer's individual security.

Read More | Download | Awards | Buy Now


Home
Our Services
Our Products
Affiliates/Resellers
Technical Support
Ordering

Why Infiltration Systems?
Solution Selection Wizard


 


Identity Protection
Frequently Asked Questions

 

1. What version of Windows does Identity Protection work with?

Identity Protection will work with Windows 2000 and XP.

Back to Top

2. What types of vulnerabilities does Identity Protection detect?

Identity Protection detects and alerts you of the following vulnerabilities:

  • Improper/Insecure registry configurations
  • Suspicious open/listening ports
  • Open file shares
  • Possible trojan installations
  • Insecure user configurations
  • Insecure password policies

Back to Top

3. How do I decrypt encrypted files?

You must first select the file to decrypt (either by manually browsing for it, or from the secure vault) - then browse to the key file you used to encrypt the file/directory originally. Once you do this simply click Decrypt to complete the process.

Back to Top

4. Can I update Spyware Cleaner's spyware/adware database?

Yes, registered users can update the spyware/adware definitions database by clicking on the update button within the software.

Back to Top

5. How do I fix a security vulnerability that Identity Protection found?

If a registry security alert is found you can choose the 'fix this alert' option within the alert listed. If an open port is found it is advised you block this port with a firewall (either via a software or hardware firewall). More information can be found on incorrect policies found by clicking on the description/information URL link under each alert. These pages will give you more information on how to fix the policy found. If you have open file shares you can close them by navigating to the file folder that is being shared and turning off its file sharing from within its file properties.

Back to Top

©2003-2012 Infiltration Systems. All Rights Reserved.    
Spy Software | Employee Monitoring Software