|
|
|
|
I already have anti-virus software
and firewall on my computer. Why do I need AS Anti-Hacker?
|
|
|
Hackers can easily bypass anti-virus
software and firewalls when you are:
(1). Clicking on deceptive pop-ups;
(2). Visiting insecure websites;
(3). Opening infected emails;
(4). Downloading shared files;
(5). Using communication applications;
(6). Using infected files from CDs;
And so on ...
According to various U.S. reports, over 90% of the world’s
PCs are at high risk of being hacked. AS Anti-Hacker focuses
on protecting your computer from internal and external
hackers.
|
|
|
How does AS Anti-Hacker differ from
anti-virus products? |
|
|
Anti-virus products focus on viruses.
They cannot completely protect you from internal and external
hackers.
AS Anti-Hacker focuses on protecting your computer from
internal and external hackers. The complete solution of
AS Anti-Hacker includes Active Protect, Insecure Website
Detection Loop (IWDL), Password Entry Protection
Gate (PEPG), Computer Cleaning, Quick System Scan,
Full System Scan, Auto-Update and Security Tools. By using
AS Anti-Hacker Enterprise, even your IT Department cannot
open your private files.
|
|
|
Can I install AS Anti-Hacker after
installing anti-virus software and firewall? |
|
|
Yes. AS
Anti-Hacker works with anti-virus software and firewall
to provide complete protection for your computer.
|
|
|
Can AS Anti-Hacker detect viruses? |
|
|
AS Anti-Hacker
is not anti-virus product and will not remove viruses.
We strongly recommend you to run an anti-virus program
along with AS Anti-Hacker for complete protection.
|
|
|
Why do other products detect hacker
tools that AS Anti-Hacker misses? |
|
|
There are several explanations
to this:
|
|
You are just using
AS Anti-Hacker Standard Edition that only provides
high protection level. You are recommended to upgrade
to AS Anti-Hacker Professional or AS Anti-Hacker
Enterprise so that you can get the highest protection
level.
|
|
Your
program or hacker definitions may be out of date.
Please run Auto-Update of AS Anti-Hacker and renew
your AS Anti-Hacker Subscription.
|
|
You are just
using Quick System Scan. You are recommended to
run Full System Scan for comprehensive and in-depth
scanning.
|
|
The
files detected by the other scanning software may
not be specifically hacker programs that AS Anti-Hacker
does not scan for.
|
|
Not every
company detects the same items. The files being
detected by another scanning software may have been
investigated by AS Anti-Hacker and have passed our
rigorous tests.
|
|
|
|
Are there any hacker software products
that can secretly record all my keystrokes to get my passwords,
Internet banking information, emails and chats? |
|
|
Yes. Thousands of hacker software products
are available in the Internet. XPCSpy Pro, TypeRecorder,
Spytech SpyAgent, Boss Everyware and Ghost Keylogger are
very popular. Some spy software can install themselves
on your computer without your consent or knowledge. They
can record everything you do on your computer.
For detail, please visit this web page: http://www.availasoft.com/products/pepg.html
|
|
|
How do hacker programs affect my
privacy and system security? |
|
|
They can steal your private and important
information (including passwords, e-mails, chats, files
and folders) from your computer without your knowledge
or consent. Hacker programs generally run in stealth mode
so that you do not know that you are being monitored.
|
|
Why do I get so many Tracking Cookies
frequently? |
|
|
Tracking
cookies can be easily installed and accessed without your
knowledge or consent. Some websites generate tracking
cookies that allow multiple websites to access your personal
information (including browsing behavior, user names and
passwords, etc). They can share the collected information
and sell it to others.
|
|
|
What does "Computer Cleaning" of
AS Anti-Hacker do? |
|
|
Most people do not realize that Windows operating systems,
Internet Explorers and many other application programs
store redundant information on your hard drive. Not only
does this affect your computer performance by occupying
extra memory but it also causes a potential crisis to
your privacy.
When someone accesses your computer, no matter it is an
intruder, a hacker, your I.T. administrator or anyone
sharing your computer, they can use these information
to find out what websites you have visited, which pictures
you have viewed, what documents you have used and much
more.
Computer Cleaning is used for cleaning up all these redundant
information on your computer, enhancing your system performance,
saving your system resources and protecting your privacy.
|
|
|
Why do I need "Securely Delete" of
AS Anti-Hacker? |
|
|
Just using
"Delete" and "Empty Recycle Bin" of Windows cannot totally
erase your private files and folders. Many "undelete"
programs in the market can recover deleted files and folders
effectively. They can even recover files and folders from
a recently formatted drive. By using "Securely Delete",
you can irrecoverably delete files and folders to fully
protect your privacy.
|
|
Technical Questions
|
|
|
|
What are the system requirements
for installing AS Anti-Hacker? |
|
Autorun doesn't work on my computer!
How can I install AS Anti-Hacker? |
|
|
If
Autorun doesn't work on your computer, you can right-click
on the Drive containing the CD, choose "Open" and double-click
"Setup.exe" to run the Installation Program.
Alternatively, you can also select the "Run..." option
of the "Start" menu and type: D:\Setup.exe, replacing
D: with your CD-ROM drive.
|
|
|
Where is the Product Key? |
|
|
You can
find the Product Key on the back of the enclosed CD pack.
|
|
|
Any special setting is required during
the installation of AS Anti-Hacker? |
|
|
For computers installed with anti-virus
software and firewall (or Internet Security), users may
be required to make the following settings so that AS
Anti-Hacker executable program (AAHapp.exe) is always
permitted to access the Internet for Auto-Update.
EXAMPLES:
"Permit (Always): AS Anti-Hacker To Access The Internet"
or
"Permit (Always): AAHapp.exe To Access The Internet"
|
|
|
Can I install AS Anti-Hacker on more
than one computer? |
|
|
Each license of AS Anti-Hacker contains
a unique Product Key. With one license (one unique Product
Key) of AS Anti-Hacker, you can install it on ONLY ONE
computer. It is illegal to install AS Anti-Hacker on more
than one computer by using the same Product Key. To install
AS Anti-Hacker on more than one computer, you must purchase
the corresponding number of licenses.
|
|
|
Do I need to register the software?
|
|
|
For your
convenience, the completed Product Registration Form in
the installation process will be automatically sent to
our Online Product Registration Center for product registration
when the Internet is connected.
The "Product Registration" section of our website is for
special customers only, you don't need to use it unless
you are instructed by our staff to do so.
|
|
|
Does "Computer Cleaning" of AS Anti-Hacker
erase program files or system files? |
|
|
No! Computer Cleaning will only
safely erase unimportant temp files and redundant system
information to protect your privacy and enhance system
performance.
|
|
|
Why can't "Computer Cleaning" fully
clean up the selected item(s)? |
|
|
Since Computer
Cleaning doesn't clean objects that are still necessary
for Windows, the selected item(s) may not be fully cleaned
up.
|
|
|
I can't find "Secure Folder" on my
"Desktop". What should I do? |
|
|
For
security purpose, Secure Folder will only appear on your
Desktop after logging in "Secure Folder" of AS Anti-Hacker.
|
|
|
Why does "Secure Folder" disappear
after logging out Secure Folder of AS Anti-Hacker? |
|
|
After logging
out Secure Folder, Secure Folder on your desktop will
be hidden, and all files of Secure Folder will be made
inaccessible. This avoids anyone else (including I.T.
Administrators of your company) getting and opening files
and folders under Secure Folder.
|
|
|
I can't open those encrypted files
(*.psf) that are linking to other encrypted files (*.psf)
in Secure Folder. What should I do? |
|
|
For security
and quick login purpose, all files under Secure Folder
are still in encrypted state (*.psf) even after logging
in Secure Folder. The best way to open any linked files
under Secure Folder is to move all relevant linked files
out of Secure Folder to another folder (outside Secure
Folder) and then right-click on the folder to select "Decrypt
with Secure Folder" to decrypt them altogether. In this
way, file-linking error will not occur. After editing,
you should move them back to Secure Folder for auto-encryption.
|
|
|
After changing my Login Password
for Secure Folder, will Secure Folder be able to decrypt
my previous *.psf files that are encrypted by my previous
Login Password of Secure Folder? |
|
|
No matter how many times you change your Login Password
of Secure Folder, Secure Folder can automatically make
use of your latest Login Password of Secure Folder to
retrieve all those previous Login Passwords of Secure
Folder from its Secure System File (sf_system.psf) to
decrypt those *.psf files encrypted by different used
Login Passwords of Secure Folder.
Under Secure Folder, the latest Login Password has the
greatest jurisdiction (power) that can open files (*.psf)
encrypted by those old Login Passwords. After logging
in Secure Folder by the latest Login Password, Secure
Folder will have the right to retrieve those old Login
Passwords from its Secure System File (sf_system.psf)
to open files (*.psf) encrypted by old Login Passwords.
|
|
|
I can't run "General Tutorial" of
AS Anti-Hacker. What should I do? |
|
|
Since Macromedia
Flash Player is not installed on your computer, you may
have problem with running "General Tutorial" of AS Anti-Hacker.
Please note that over 90% of computers are already installed
with Macromedia Flash Player. Please go to http://www.macromedia.com
to download the latest Macromedia Flash Player.
|
|
|
I forgot my password for Secure Folder.
Can you help me? |
|
How can I get support from AvailaSoft?
|
|
|
We provide
different tailor-made support for End-Users, Resellers,
Partners and Distributors. Please go to "Services" section
on the top of our website and select the right subject.
In order to process your request in the most efficient
and effective way, you are required to fill in the corresponding
form.
|
|
|