Program Control

Program control protects you from Trojan horses and other hacker malware by making sure only programs with your permission can access the Internet.


Why do I need program control?

Everything you do on the Internet—from browsing Web pages to downloading MP3 files—is managed by specific applications (programs) on your computer.

Hackers exploit this fact by planting "malware"—literally, evil programs—on your computer. Sometimes they send out malware as e-mail attachments with innocent names like "screensaver.exe." If you open the attachment, you install the malware on you computer without even knowing it. Other times, they convince you to download the malware from a server by making it masquerade as an update to a legitimate program.

Once on your machine, malware can wreak havoc in a variety of ways. It can raid your address book and send itself to everyone in it, or it can listen for connection requests from the Internet. The hacker who distributed the malware can then contact it and give it instructions, effectively taking control of your computer.

ZoneAlarm Pro protects you from malware attacks

ZoneAlarm Pro's program control features use the following methods to protect you from malware attacks:

Related Topics

Back to top


Program Authentication

Whenever a program on your computer wants to access the Internet, ZoneAlarm Pro authenticates it via its MD5 signature.

If the program has been altered since the last time it accessed the Internet, ZoneAlarm Pro displays a Changed Program alert (shown at left). YOU decide whether the program should be allowed access or not.

For added security, ZoneAlarm Pro also authenticates the components (for example, DLL files) associated with the program's main executable file. If a component has been altered, you'll see a Program Component alert similar in appearance to a Changed Program alert.

For more information about program authentication or about alerts, see Related Topics.

Related Topics

Back to top


Program Access Control

When you're using ZoneAlarm Pro, no program on your computer can access the Internet or your local network, or act as a server, unless you give it permission to do so.

When a program requests access for the first time...

A New Program alert (shown at left) asks you if you want to grant the program access permission.

If you're not sure whether to click Yes or No, you can click the More Info to have Zone Labs' Alert Advisor help you decide what to do.

A Program Component alert (similar to a new program alert) lets you know if the program is using a component that is new or has changed.

If the same program requests access again...

A Repeat Program alert (shown at left) asks you if you want to grant (or deny) access permission to a program that has requested it before.

Tip To avoid seeing repeat program alerts, select the Remember this answer check box near the bottom of the alert before clicking Yes or No. After that, ZoneAlarm Pro will silently block or allow the program.

When a program asks for server permission...

A Server Program alert (shown at left) asks you if you want grant server permission to a program.

Caution Because Trojan horses and other types of malware often need server rights in order to do mischief, you should be careful to give server permission only to programs that you know and trust, and that need server permission to operate properly.

Related Topics

Back to top


Advanced Program Control

Advanced Program Control informs you when one program tries to use another program to gain access to the Internet.

When a program tries to use another program to gain network access...

An Advanced Program alert asks you if you want to grant the program permission to access through other programs.

Related Topics

Back to top


Related Topics

Program authentication
ZoneAlarm Pro alerts

Back


Glossary

Trojan horse
A malicious program that masquerades as something useful or harmless, such as a screen saver. Some Trojan horses operate by setting themselves up as servers on your computer, listening for connections from the outside. If a hacker succeeds in contacting the program, he can effectively take control of your computer. This is why it's important to only give server permission to programs you know and trust. Other Trojan horses attempt to contact a remote address automatically.

 

Back

access permission
Access permission allows a program on your computer to initiate communications with another computer. This is distinct from server permission, which allows a program to "listen" for connection requests from other computers. You can give a program access permission for the Trusted Zone, the Internet Zone, or both.

Several common applications may need access permission to operate normally. For example, your browser needs access permission in order to contact your ISP's servers. Your e-mail client (for example, MS Outlook) needs access permission in order to send or receive e-mail.

The following basic options are available for each program:

Allow the program to connect to computers in the Internet Zone / Trusted Zone

Block the program from accessing computers in the Internet Zone / Trusted Zone

Ask whether the program should have access permission (show Repeat Program alert)

Back

server permission
Server permission allows a program on your computer to "listen" for connection requests from other computers, in effect giving those computers the power to initiate communications with yours. This is distinct from access permission, which allows a program to initiate a communications session with another computer.

Several common types of applications, such as chat programs, e-mail clients, and Internet Call Waiting programs, may need server permission to operate properly. Grant server permission only to programs you're sure you trust, and that require it in order to work.

If possible, avoid granting a program server permission for the Internet Zone. If you need to accept incoming connections from only a small number of machines, add those machines to the Trusted Zone, and then allow the program server permission for the Trusted Zone only.

The following basic options are available for each program

Allow the program to listen for connection requests

Block the program from listening for connection requests

Ask me whether to allow the program to listen for connection requests (show Server Program alert)

Back

component
A small program or set of functions that larger programs call on to perform specific tasks. Some components may be used by several different programs simultaneously. Windows operating systems provide many component DLLs (Dynamic Link Libraries) for use by a variety of Windows applications.

Back

MD5 signature
A digital "fingerprint" used to verify the integrity of a file. If a file has been changed in any way (for example, if a program has been compromised by a hacker), its MD5 signature will change as well.

Back