SlideShare a Scribd company logo
1 of 4
Download to read offline
THE ULTIMATE eSAFETY SOLUTION
ENSURING THE
RESPONSIBLE USE OF I.T.
PRODUCT
FEATURES
• Comprehensive Pornography Detection
iShield®
Plus monitors your PC for pornography,
irrespective of its source. This means that all
pornography being viewed on your PC, from all
sources such as emails, USB drives, CDs, DVDs and
downloaded image files can be detected and
blocked.
This is made possible through iShield®
Plus’s
innovative image processing and neural network
based engine. iShield®
Plus extracts information
relating to skin tone, texture, edges, limbs and faces
from an image to decide if the image is potentially
pornographic.
• Monitoring Internet Content
The Internet holds a vast amount of content easily accessible
through web pages; however a lot of this content is not
appropriate for all users. iShield®
Plus therefore keeps an extra
careful watch on the web pages being viewed.
iShield®
Plus analyzes the text, images, links and meta-data
present in web pages to determine the nature of the content. If
the content is pornographic, or falls in one of the categories that
you wish to block (drugs, gambling, lingerie, etc) then iShield®
Plus
will take appropriate action.
In addition iShield®
Plus allows you to maintain your own white / black
lists for customizing those sites which can be accessed or blocked.
• Monitoring Communications
iShield®
Plus provides notification of potential grooming or bullying.
iShield®
Plus does this by monitoring everything that is typed by the
user as well as the contents of chat, Instant Messaging
communications and MS Office files.
iShield®
Plus comes with a sizable database of phrases that are
indicative of potentially harmful activities. You can add your own
phrases to this database and so customize the protection
provided.
iShield®
Plus is a unique monitoring solution that provides you with
the highest level of protection against computer based
pornography, undesirable web content and online grooming or
bullying.
iShield®
Plus allows you to control when your PC can connect to
the Internet and the applications that can be used. iShield®
Plus
also monitors productivity and safeguards personal information.
iShield®
Plus is designed for ease of use and can be set up for
individual members of the family with minimal fuss.
THE ULTIMATE
PARENTAL
CONTROL
SOLUTION
• Obscene words
• Innocent words
• Porn Counters / Trackers
• Web-page structure
• Web-page metadata
• Internet Rating Systems
• (RSACi, SafeSurf, PICS)
Edge
Detection
Mass
Detection
Texture
Detection
Skin Tone
Detection
Limb
Detection
Face
Detection
Decision
Neural Network
Input Layer
Output Layer
Hidden Layer
“More than 10,000 new sex sites are added to the internet evert week”
– Melbourne Age
“Most Children Nowadays are more computer literate than their parents think and
finding sexually explicit images simply requires a few minutes”
– Censorship of Pornography on the internet
• Disk Drive Scanning
iShield®
Plus’s scan drive feature analyzes all files
in your PC and provides you with a report of any
potentially pornographic images or videos that
are present.All suspect files can be deleted with
a single mouse click, thereby ensuring that your
PC is free of inappropriate material.
• Customizable Protection Modes
iShield®
Plus allows you to set the action that
takes place should inappropriate material be
detected. The options include just recording
violations (passive mode), giving a warning
(warn mode), blocking inappropriate content
(block mode) or allowing access only to
websites listed on the white list.
Custom user profiles (adult, teen or child) can
be set with different level of controls and settings
for each user.
• Incident Reports
iShield®
Plus keeps detailed records of the who,
what, when and where of each incident
detected on your computer. iShield®
Plus retains
and presents these records in an easy to use
Incident Viewer.
iShield®
Plus can be configured to send an
email whenever such an incidence occurs,
allowing you to monitor your PC when you are
away from home.
• Safe and Productive Internet and Application Usage
You can define the “surfing hours” during which your PC can connect to the Internet. Further, you
can limit access to certain applications. For example you might like to block games during study
hours. Finally, you can also block peer-to-peer file sharing applications, which as well as being a
common means for downloading pirated music and videos, also pose security risks as they often
contain spyware, viruses and malware.
iShield®
Plus provides“productivity reports”showing the amount of time different users have spent on
each application.This allows you to ensure that the PC is being used productively.
To protect any sensitive information you might have from being stolen by malicious software or
being inappropriately distributed by users, iShield®
Plus provides a personal information protection
feature.To use this feature, specify the information you wish to protect (phone numbers, credit card
details, etc) and iShield®
Plus will then block that information from being transmitted onto the
Internet.
SYSTEM
REQUIREMENTS
• Internet Explorer 5.0 or higher
• Netscape 7.1 or higher
• Firefox 1.0 or higher
• Mozilla 1.4 or higher
• Sea Monkey 1.0 or higher
• Windows 2000
• Windows XP
• Windows Vista
• Pentium 500 MHz
• 256 MB RAM
• 50 MB Hard Disk Space
Browsers
Platforms
Minimum system requirements
Guardware is a software solution provider committed to developing and marketing innovative
personal computer applications that improve productivity and security. Guardware’s products have
received numerous awards as well as strong press reviews from technology publications like PC
Magazine and Network World. Founded in 2000, Guardware is headquartered in the UK and has
offices and distributors around the world.
ABOUT
GUARDWARE
DISBTRIBUTED
WORLDWIDE BY
Baslow House, School Lane, Baslow,
Derbyshire, DE45 1RZ, United Kingdom.
Phone: 0870-066-0794 Fax: 0870-066-0795
Email: info@guardware.com
Web: www.guardware.com
UNITED KINGDOM
GuardWare Ltd.
Baslow House, School Lane, Baslow,
Derbyshire, DE45 1RZ, United Kingdom.
Phone: 0870-066-0794
Fax: 0870-066-0795
UNITED STATES OF AMERICA
GuardWare Inc.
P.O. Box 56, Media Pa 19063,
United States of America.
Phone: 800-747-1125
Fax: 610-627-0138
MALAYSIA
APIIT Sdn Bhd
Technology Park Malaysia, Bukit Jalil,
57000 Kuala Lumpur, Malaysia.
Phone: +603 8994 6077
Fax: +603 8994 6207
ENSURING THE
RESPONSIBLE USE OF I.T.

More Related Content

What's hot

Introduction to Information security
Introduction to Information securityIntroduction to Information security
Introduction to Information securityRashad Aliyev
 
Importance of cyber security in education sector
Importance of cyber security in education sectorImportance of cyber security in education sector
Importance of cyber security in education sectorSeqrite
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!EMBplc.com
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaEvan Pathiratne
 
Prince banton cybercrime presentation
Prince banton cybercrime presentationPrince banton cybercrime presentation
Prince banton cybercrime presentationPrinceBanton1
 
Is your privacy, private?
Is your privacy, private?Is your privacy, private?
Is your privacy, private?DionShawMSPM
 
InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsLiberteks
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
 
Humming Heads Presentation
Humming Heads PresentationHumming Heads Presentation
Humming Heads PresentationDansha
 
Cyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesCyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesPaige Rasid
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in ManufacturingCentraComm
 

What's hot (20)

Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
Introduction to Information security
Introduction to Information securityIntroduction to Information security
Introduction to Information security
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Three trends in cybersecurity
Three trends in cybersecurityThree trends in cybersecurity
Three trends in cybersecurity
 
Importance of cyber security in education sector
Importance of cyber security in education sectorImportance of cyber security in education sector
Importance of cyber security in education sector
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
 
Online safety
Online safety Online safety
Online safety
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 
Cyber security and crime
Cyber security and crimeCyber security and crime
Cyber security and crime
 
Prince banton cybercrime presentation
Prince banton cybercrime presentationPrince banton cybercrime presentation
Prince banton cybercrime presentation
 
Is your privacy, private?
Is your privacy, private?Is your privacy, private?
Is your privacy, private?
 
Internet security
Internet securityInternet security
Internet security
 
InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security Tips
 
IT Security Awareness - How to?
IT Security Awareness - How to?IT Security Awareness - How to?
IT Security Awareness - How to?
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Humming Heads Presentation
Humming Heads PresentationHumming Heads Presentation
Humming Heads Presentation
 
Cyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesCyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass Houses
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
TalTech Luncheon Talk on Cybersecurity and Healthcare
TalTech Luncheon Talk on Cybersecurity and HealthcareTalTech Luncheon Talk on Cybersecurity and Healthcare
TalTech Luncheon Talk on Cybersecurity and Healthcare
 

Similar to I shieldplus

SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security ChecklistMobeen Khan
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Protect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak preventionProtect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak preventionAdi Saputra
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...David Menken
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyAEGILITY
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutionsFuji Xerox Singapore
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Endpoint Security
Endpoint Security Endpoint Security
Endpoint Security Zack Fabro
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffNicholas Davis
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public schoolDevku45
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
Slicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureSlicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureMargus Meigo
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Cognitive Computing in Security with AI
Cognitive Computing in Security with AI Cognitive Computing in Security with AI
Cognitive Computing in Security with AI JoAnna Cheshire
 

Similar to I shieldplus (20)

datasheet-quickheal-total-securitypdf...
datasheet-quickheal-total-securitypdf...datasheet-quickheal-total-securitypdf...
datasheet-quickheal-total-securitypdf...
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
 
IT Security for Small Business
IT Security for Small BusinessIT Security for Small Business
IT Security for Small Business
 
Internet security
Internet securityInternet security
Internet security
 
Protect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak preventionProtect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak prevention
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
Internet
InternetInternet
Internet
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Endpoint Security
Endpoint Security Endpoint Security
Endpoint Security
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
 
Cyber security
Cyber securityCyber security
Cyber security
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Slicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureSlicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecure
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Cognitive Computing in Security with AI
Cognitive Computing in Security with AI Cognitive Computing in Security with AI
Cognitive Computing in Security with AI
 

Recently uploaded

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 

Recently uploaded (20)

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

I shieldplus

  • 1. THE ULTIMATE eSAFETY SOLUTION ENSURING THE RESPONSIBLE USE OF I.T.
  • 2. PRODUCT FEATURES • Comprehensive Pornography Detection iShield® Plus monitors your PC for pornography, irrespective of its source. This means that all pornography being viewed on your PC, from all sources such as emails, USB drives, CDs, DVDs and downloaded image files can be detected and blocked. This is made possible through iShield® Plus’s innovative image processing and neural network based engine. iShield® Plus extracts information relating to skin tone, texture, edges, limbs and faces from an image to decide if the image is potentially pornographic. • Monitoring Internet Content The Internet holds a vast amount of content easily accessible through web pages; however a lot of this content is not appropriate for all users. iShield® Plus therefore keeps an extra careful watch on the web pages being viewed. iShield® Plus analyzes the text, images, links and meta-data present in web pages to determine the nature of the content. If the content is pornographic, or falls in one of the categories that you wish to block (drugs, gambling, lingerie, etc) then iShield® Plus will take appropriate action. In addition iShield® Plus allows you to maintain your own white / black lists for customizing those sites which can be accessed or blocked. • Monitoring Communications iShield® Plus provides notification of potential grooming or bullying. iShield® Plus does this by monitoring everything that is typed by the user as well as the contents of chat, Instant Messaging communications and MS Office files. iShield® Plus comes with a sizable database of phrases that are indicative of potentially harmful activities. You can add your own phrases to this database and so customize the protection provided. iShield® Plus is a unique monitoring solution that provides you with the highest level of protection against computer based pornography, undesirable web content and online grooming or bullying. iShield® Plus allows you to control when your PC can connect to the Internet and the applications that can be used. iShield® Plus also monitors productivity and safeguards personal information. iShield® Plus is designed for ease of use and can be set up for individual members of the family with minimal fuss. THE ULTIMATE PARENTAL CONTROL SOLUTION • Obscene words • Innocent words • Porn Counters / Trackers • Web-page structure • Web-page metadata • Internet Rating Systems • (RSACi, SafeSurf, PICS) Edge Detection Mass Detection Texture Detection Skin Tone Detection Limb Detection Face Detection Decision Neural Network Input Layer Output Layer Hidden Layer
  • 3. “More than 10,000 new sex sites are added to the internet evert week” – Melbourne Age “Most Children Nowadays are more computer literate than their parents think and finding sexually explicit images simply requires a few minutes” – Censorship of Pornography on the internet • Disk Drive Scanning iShield® Plus’s scan drive feature analyzes all files in your PC and provides you with a report of any potentially pornographic images or videos that are present.All suspect files can be deleted with a single mouse click, thereby ensuring that your PC is free of inappropriate material. • Customizable Protection Modes iShield® Plus allows you to set the action that takes place should inappropriate material be detected. The options include just recording violations (passive mode), giving a warning (warn mode), blocking inappropriate content (block mode) or allowing access only to websites listed on the white list. Custom user profiles (adult, teen or child) can be set with different level of controls and settings for each user. • Incident Reports iShield® Plus keeps detailed records of the who, what, when and where of each incident detected on your computer. iShield® Plus retains and presents these records in an easy to use Incident Viewer. iShield® Plus can be configured to send an email whenever such an incidence occurs, allowing you to monitor your PC when you are away from home. • Safe and Productive Internet and Application Usage You can define the “surfing hours” during which your PC can connect to the Internet. Further, you can limit access to certain applications. For example you might like to block games during study hours. Finally, you can also block peer-to-peer file sharing applications, which as well as being a common means for downloading pirated music and videos, also pose security risks as they often contain spyware, viruses and malware. iShield® Plus provides“productivity reports”showing the amount of time different users have spent on each application.This allows you to ensure that the PC is being used productively. To protect any sensitive information you might have from being stolen by malicious software or being inappropriately distributed by users, iShield® Plus provides a personal information protection feature.To use this feature, specify the information you wish to protect (phone numbers, credit card details, etc) and iShield® Plus will then block that information from being transmitted onto the Internet.
  • 4. SYSTEM REQUIREMENTS • Internet Explorer 5.0 or higher • Netscape 7.1 or higher • Firefox 1.0 or higher • Mozilla 1.4 or higher • Sea Monkey 1.0 or higher • Windows 2000 • Windows XP • Windows Vista • Pentium 500 MHz • 256 MB RAM • 50 MB Hard Disk Space Browsers Platforms Minimum system requirements Guardware is a software solution provider committed to developing and marketing innovative personal computer applications that improve productivity and security. Guardware’s products have received numerous awards as well as strong press reviews from technology publications like PC Magazine and Network World. Founded in 2000, Guardware is headquartered in the UK and has offices and distributors around the world. ABOUT GUARDWARE DISBTRIBUTED WORLDWIDE BY Baslow House, School Lane, Baslow, Derbyshire, DE45 1RZ, United Kingdom. Phone: 0870-066-0794 Fax: 0870-066-0795 Email: info@guardware.com Web: www.guardware.com UNITED KINGDOM GuardWare Ltd. Baslow House, School Lane, Baslow, Derbyshire, DE45 1RZ, United Kingdom. Phone: 0870-066-0794 Fax: 0870-066-0795 UNITED STATES OF AMERICA GuardWare Inc. P.O. Box 56, Media Pa 19063, United States of America. Phone: 800-747-1125 Fax: 610-627-0138 MALAYSIA APIIT Sdn Bhd Technology Park Malaysia, Bukit Jalil, 57000 Kuala Lumpur, Malaysia. Phone: +603 8994 6077 Fax: +603 8994 6207 ENSURING THE RESPONSIBLE USE OF I.T.