SlideShare a Scribd company logo
1 of 4
Download to read offline
THE ULTIMATE eSAFETY SOLUTION
ENSURING THE
RESPONSIBLE USE OF I.T.
PRODUCT
FEATURES
• Comprehensive Pornography Detection
iShield®
Plus monitors your PC for pornography,
irrespective of its source. This means that all
pornography being viewed on your PC, from all
sources such as emails, USB drives, CDs, DVDs and
downloaded image files can be detected and
blocked.
This is made possible through iShield®
Plus’s
innovative image processing and neural network
based engine. iShield®
Plus extracts information
relating to skin tone, texture, edges, limbs and faces
from an image to decide if the image is potentially
pornographic.
• Monitoring Internet Content
The Internet holds a vast amount of content easily accessible
through web pages; however a lot of this content is not
appropriate for all users. iShield®
Plus therefore keeps an extra
careful watch on the web pages being viewed.
iShield®
Plus analyzes the text, images, links and meta-data
present in web pages to determine the nature of the content. If
the content is pornographic, or falls in one of the categories that
you wish to block (drugs, gambling, lingerie, etc) then iShield®
Plus
will take appropriate action.
In addition iShield®
Plus allows you to maintain your own white / black
lists for customizing those sites which can be accessed or blocked.
• Monitoring Communications
iShield®
Plus provides notification of potential grooming or bullying.
iShield®
Plus does this by monitoring everything that is typed by the
user as well as the contents of chat, Instant Messaging
communications and MS Office files.
iShield®
Plus comes with a sizable database of phrases that are
indicative of potentially harmful activities. You can add your own
phrases to this database and so customize the protection
provided.
iShield®
Plus is a unique monitoring solution that provides you with
the highest level of protection against computer based
pornography, undesirable web content and online grooming or
bullying.
iShield®
Plus allows you to control when your PC can connect to
the Internet and the applications that can be used. iShield®
Plus
also monitors productivity and safeguards personal information.
iShield®
Plus is designed for ease of use and can be set up for
individual members of the family with minimal fuss.
THE ULTIMATE
PARENTAL
CONTROL
SOLUTION
• Obscene words
• Innocent words
• Porn Counters / Trackers
• Web-page structure
• Web-page metadata
• Internet Rating Systems
• (RSACi, SafeSurf, PICS)
Edge
Detection
Mass
Detection
Texture
Detection
Skin Tone
Detection
Limb
Detection
Face
Detection
Decision
Neural Network
Input Layer
Output Layer
Hidden Layer
“More than 10,000 new sex sites are added to the internet evert week”
– Melbourne Age
“Most Children Nowadays are more computer literate than their parents think and
finding sexually explicit images simply requires a few minutes”
– Censorship of Pornography on the internet
• Disk Drive Scanning
iShield®
Plus’s scan drive feature analyzes all files
in your PC and provides you with a report of any
potentially pornographic images or videos that
are present.All suspect files can be deleted with
a single mouse click, thereby ensuring that your
PC is free of inappropriate material.
• Customizable Protection Modes
iShield®
Plus allows you to set the action that
takes place should inappropriate material be
detected. The options include just recording
violations (passive mode), giving a warning
(warn mode), blocking inappropriate content
(block mode) or allowing access only to
websites listed on the white list.
Custom user profiles (adult, teen or child) can
be set with different level of controls and settings
for each user.
• Incident Reports
iShield®
Plus keeps detailed records of the who,
what, when and where of each incident
detected on your computer. iShield®
Plus retains
and presents these records in an easy to use
Incident Viewer.
iShield®
Plus can be configured to send an
email whenever such an incidence occurs,
allowing you to monitor your PC when you are
away from home.
• Safe and Productive Internet and Application Usage
You can define the “surfing hours” during which your PC can connect to the Internet. Further, you
can limit access to certain applications. For example you might like to block games during study
hours. Finally, you can also block peer-to-peer file sharing applications, which as well as being a
common means for downloading pirated music and videos, also pose security risks as they often
contain spyware, viruses and malware.
iShield®
Plus provides“productivity reports”showing the amount of time different users have spent on
each application.This allows you to ensure that the PC is being used productively.
To protect any sensitive information you might have from being stolen by malicious software or
being inappropriately distributed by users, iShield®
Plus provides a personal information protection
feature.To use this feature, specify the information you wish to protect (phone numbers, credit card
details, etc) and iShield®
Plus will then block that information from being transmitted onto the
Internet.
I shieldplus new

More Related Content

What's hot

National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWPICPE
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaEvan Pathiratne
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security toolsVicky Fernandes
 
Information security awareness training
Information security awareness trainingInformation security awareness training
Information security awareness trainingSandeep Taileng
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Ekonomikas ministrija
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security TechnologiesRuchikaSachdeva4
 
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsNATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsBenjamin Rohé
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awarenessArjun Chetry
 

What's hot (20)

National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 
Information security awareness training
Information security awareness trainingInformation security awareness training
Information security awareness training
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Information Security Engineering
Information Security EngineeringInformation Security Engineering
Information Security Engineering
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsNATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-Ups
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 

Viewers also liked

DGL misinformation debate
DGL misinformation debateDGL misinformation debate
DGL misinformation debateKmross
 
Variations of Vibrations
Variations of VibrationsVariations of Vibrations
Variations of VibrationsRachel Gamblin
 
Cscs Neonatales
Cscs NeonatalesCscs Neonatales
Cscs Neonatalesflaka77
 
Introduction Business Promotion July 2012
Introduction Business Promotion July 2012Introduction Business Promotion July 2012
Introduction Business Promotion July 2012Sandeep Goyal
 
Sticking Points: Tips for Advancing the PLA Conversation presentation at the ...
Sticking Points: Tips for Advancing the PLA Conversation presentation at the ...Sticking Points: Tips for Advancing the PLA Conversation presentation at the ...
Sticking Points: Tips for Advancing the PLA Conversation presentation at the ...cccschamp
 
Alcohol, drugs, and porn
Alcohol, drugs, and pornAlcohol, drugs, and porn
Alcohol, drugs, and pornChris Haller
 
Presentacion Mico
Presentacion MicoPresentacion Mico
Presentacion Micoferysanchez
 
Learner and student experience in an age of austerity: how is the agenda set?
Learner and student experience in an age of austerity: how is the agenda set?Learner and student experience in an age of austerity: how is the agenda set?
Learner and student experience in an age of austerity: how is the agenda set?ELESIGpresentations
 
Voin intern
Voin internVoin intern
Voin internusznsvao
 
17 acuerdo+no+017+de+julio+10+de+2012.
17 acuerdo+no+017+de+julio+10+de+2012.17 acuerdo+no+017+de+julio+10+de+2012.
17 acuerdo+no+017+de+julio+10+de+2012.Alejandro Lopez
 
Presentació del Projecte de Normalització Tipogràfica de la Ela Geminada
Presentació del Projecte de Normalització Tipogràfica de la Ela GeminadaPresentació del Projecte de Normalització Tipogràfica de la Ela Geminada
Presentació del Projecte de Normalització Tipogràfica de la Ela GeminadaFundació Puntcat
 
Brincar com as letras
Brincar com as letrasBrincar com as letras
Brincar com as letrasanatao
 

Viewers also liked (20)

Pl usl
Pl uslPl usl
Pl usl
 
Shkbal
ShkbalShkbal
Shkbal
 
Masl13
Masl13Masl13
Masl13
 
DGL misinformation debate
DGL misinformation debateDGL misinformation debate
DGL misinformation debate
 
Variations of Vibrations
Variations of VibrationsVariations of Vibrations
Variations of Vibrations
 
CP DR3
CP DR3CP DR3
CP DR3
 
Cscs Neonatales
Cscs NeonatalesCscs Neonatales
Cscs Neonatales
 
00060893
0006089300060893
00060893
 
Introduction Business Promotion July 2012
Introduction Business Promotion July 2012Introduction Business Promotion July 2012
Introduction Business Promotion July 2012
 
Cleveland county 4 h
Cleveland county 4 hCleveland county 4 h
Cleveland county 4 h
 
Medios de transmision
Medios de transmisionMedios de transmision
Medios de transmision
 
Sticking Points: Tips for Advancing the PLA Conversation presentation at the ...
Sticking Points: Tips for Advancing the PLA Conversation presentation at the ...Sticking Points: Tips for Advancing the PLA Conversation presentation at the ...
Sticking Points: Tips for Advancing the PLA Conversation presentation at the ...
 
Alcohol, drugs, and porn
Alcohol, drugs, and pornAlcohol, drugs, and porn
Alcohol, drugs, and porn
 
Presentacion Mico
Presentacion MicoPresentacion Mico
Presentacion Mico
 
Learner and student experience in an age of austerity: how is the agenda set?
Learner and student experience in an age of austerity: how is the agenda set?Learner and student experience in an age of austerity: how is the agenda set?
Learner and student experience in an age of austerity: how is the agenda set?
 
Latin America
Latin AmericaLatin America
Latin America
 
Voin intern
Voin internVoin intern
Voin intern
 
17 acuerdo+no+017+de+julio+10+de+2012.
17 acuerdo+no+017+de+julio+10+de+2012.17 acuerdo+no+017+de+julio+10+de+2012.
17 acuerdo+no+017+de+julio+10+de+2012.
 
Presentació del Projecte de Normalització Tipogràfica de la Ela Geminada
Presentació del Projecte de Normalització Tipogràfica de la Ela GeminadaPresentació del Projecte de Normalització Tipogràfica de la Ela Geminada
Presentació del Projecte de Normalització Tipogràfica de la Ela Geminada
 
Brincar com as letras
Brincar com as letrasBrincar com as letras
Brincar com as letras
 

Similar to I shieldplus new

Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...David Menken
 
Cognitive Computing in Security with AI
Cognitive Computing in Security with AI Cognitive Computing in Security with AI
Cognitive Computing in Security with AI JoAnna Cheshire
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyAEGILITY
 
Peter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive SecurityPeter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive Securityscoopnewsgroup
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Chapter 13
Chapter 13Chapter 13
Chapter 13bodo-con
 
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10thCYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10thUnited Technology Group (UTG)
 
Module 1 content EN.pptx
Module 1 content EN.pptxModule 1 content EN.pptx
Module 1 content EN.pptxITStudy Ltd.
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Deepak Khari
 
Protect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak preventionProtect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak preventionAdi Saputra
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffNicholas Davis
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security ChecklistMobeen Khan
 

Similar to I shieldplus new (20)

datasheet-quickheal-total-securitypdf...
datasheet-quickheal-total-securitypdf...datasheet-quickheal-total-securitypdf...
datasheet-quickheal-total-securitypdf...
 
Internet
InternetInternet
Internet
 
Internet security
Internet securityInternet security
Internet security
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
IT Security for Small Business
IT Security for Small BusinessIT Security for Small Business
IT Security for Small Business
 
Cognitive Computing in Security with AI
Cognitive Computing in Security with AI Cognitive Computing in Security with AI
Cognitive Computing in Security with AI
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
Peter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive SecurityPeter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive Security
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10thCYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
 
Module 1 content EN.pptx
Module 1 content EN.pptxModule 1 content EN.pptx
Module 1 content EN.pptx
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak
 
Protect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak preventionProtect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak prevention
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
 
Cyber security
Cyber securityCyber security
Cyber security
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
 

Recently uploaded

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

I shieldplus new

  • 1. THE ULTIMATE eSAFETY SOLUTION ENSURING THE RESPONSIBLE USE OF I.T.
  • 2. PRODUCT FEATURES • Comprehensive Pornography Detection iShield® Plus monitors your PC for pornography, irrespective of its source. This means that all pornography being viewed on your PC, from all sources such as emails, USB drives, CDs, DVDs and downloaded image files can be detected and blocked. This is made possible through iShield® Plus’s innovative image processing and neural network based engine. iShield® Plus extracts information relating to skin tone, texture, edges, limbs and faces from an image to decide if the image is potentially pornographic. • Monitoring Internet Content The Internet holds a vast amount of content easily accessible through web pages; however a lot of this content is not appropriate for all users. iShield® Plus therefore keeps an extra careful watch on the web pages being viewed. iShield® Plus analyzes the text, images, links and meta-data present in web pages to determine the nature of the content. If the content is pornographic, or falls in one of the categories that you wish to block (drugs, gambling, lingerie, etc) then iShield® Plus will take appropriate action. In addition iShield® Plus allows you to maintain your own white / black lists for customizing those sites which can be accessed or blocked. • Monitoring Communications iShield® Plus provides notification of potential grooming or bullying. iShield® Plus does this by monitoring everything that is typed by the user as well as the contents of chat, Instant Messaging communications and MS Office files. iShield® Plus comes with a sizable database of phrases that are indicative of potentially harmful activities. You can add your own phrases to this database and so customize the protection provided. iShield® Plus is a unique monitoring solution that provides you with the highest level of protection against computer based pornography, undesirable web content and online grooming or bullying. iShield® Plus allows you to control when your PC can connect to the Internet and the applications that can be used. iShield® Plus also monitors productivity and safeguards personal information. iShield® Plus is designed for ease of use and can be set up for individual members of the family with minimal fuss. THE ULTIMATE PARENTAL CONTROL SOLUTION • Obscene words • Innocent words • Porn Counters / Trackers • Web-page structure • Web-page metadata • Internet Rating Systems • (RSACi, SafeSurf, PICS) Edge Detection Mass Detection Texture Detection Skin Tone Detection Limb Detection Face Detection Decision Neural Network Input Layer Output Layer Hidden Layer
  • 3. “More than 10,000 new sex sites are added to the internet evert week” – Melbourne Age “Most Children Nowadays are more computer literate than their parents think and finding sexually explicit images simply requires a few minutes” – Censorship of Pornography on the internet • Disk Drive Scanning iShield® Plus’s scan drive feature analyzes all files in your PC and provides you with a report of any potentially pornographic images or videos that are present.All suspect files can be deleted with a single mouse click, thereby ensuring that your PC is free of inappropriate material. • Customizable Protection Modes iShield® Plus allows you to set the action that takes place should inappropriate material be detected. The options include just recording violations (passive mode), giving a warning (warn mode), blocking inappropriate content (block mode) or allowing access only to websites listed on the white list. Custom user profiles (adult, teen or child) can be set with different level of controls and settings for each user. • Incident Reports iShield® Plus keeps detailed records of the who, what, when and where of each incident detected on your computer. iShield® Plus retains and presents these records in an easy to use Incident Viewer. iShield® Plus can be configured to send an email whenever such an incidence occurs, allowing you to monitor your PC when you are away from home. • Safe and Productive Internet and Application Usage You can define the “surfing hours” during which your PC can connect to the Internet. Further, you can limit access to certain applications. For example you might like to block games during study hours. Finally, you can also block peer-to-peer file sharing applications, which as well as being a common means for downloading pirated music and videos, also pose security risks as they often contain spyware, viruses and malware. iShield® Plus provides“productivity reports”showing the amount of time different users have spent on each application.This allows you to ensure that the PC is being used productively. To protect any sensitive information you might have from being stolen by malicious software or being inappropriately distributed by users, iShield® Plus provides a personal information protection feature.To use this feature, specify the information you wish to protect (phone numbers, credit card details, etc) and iShield® Plus will then block that information from being transmitted onto the Internet.