Chapter 3: Setting Up RealSecure Desktop Protector

Uninstalling Desktop Protector

Introduction

Record your license key

Uninstalling Desktop Protector from the Windows control panel

You can remove Desktop Protector from your computer using the Windows Add/Remove Programs Utility or the BlackICE Agentremove utility.

Important: Use the agentremove.exe utility only if you are unable to remove Desktop Protector through the Windows Add/Remove utility. This utility removes the user interface component (blackice.exe), the application protection component (rapapp.exe), and the intrusion detection engine (blackd.exe).

Note: When you uninstall Desktop Protector, the local system is no longer protected from intrusions.

Before you remove Desktop Protector, be sure to record your license key and store it in a safe place. You must re-enter your license key when you reinstall Desktop Protector.

To uninstall Desktop Protector in Windows:

1.Click StartÆSettingsÆControl Panel.

2.Double-clickAdd/Remove Programs.

3.Locate the BlackICE program, and then click one of the following options based on your platform:

On Windows NT, click Add/Remove.

On Windows 2000 or Windows XP, click Change/Remove.

The uninstall program asks you to confirm that you want to delete the program files.

4.Click Yes.

The uninstall program asks you if you want to delete the configuration settings that control RealSecure Desktop Protector on this computer.

5.Do you intend to reinstall Desktop Protector?

If yes, keep the files that contain settings you will continue to use. To keep a file, leave its checkbox selected.

If no, clear all the checkboxes.

You can decide to delete or keep the following files:

firewall.ini: This file contains any firewall entries you have added to protect against specific events or intruders. If you have customized your local firewall settings, you may want to keep this file for later use.

blackice.ini: This file contains the settings that determine how your local Desktop Protector user interface behaves. If you have configured Desktop Protector alerts or visual or sound feedback and would like to use the same settings when you reinstall Desktop Protector, you may want to keep this file.

sigs.ini: This file contains information about intrusion types for the BlackICE intrusion detection component to watch for. If you have added any signatures to the default signature database, you may want to keep this file for later use.

protect.ini: This file contains the instructions that determine how Desktop Protector handles unknown applications and unauthorized network access. If you have customized these settings, you may want to keep this file.

6.Click Next.

28

Page 36
Image 36
Internet Security Systems 3.5 manual Uninstalling Desktop Protector

3.5, Desktop Protector specifications

Internet Security Systems Desktop Protector 3.5 is a robust cybersecurity solution designed to provide comprehensive protection for personal computers and workstations. As cyber threats continue to evolve, this software aims to protect users against malware, phishing, and other malicious attacks with its advanced feature set and technologies.

One of the main features of Desktop Protector 3.5 is its real-time scanning capability. It constantly monitors files and applications on the system for any signs of malicious activity. This proactive approach ensures that harmful software is detected and neutralized before it can execute, providing users with peace of mind as they navigate the internet or access sensitive information.

Another significant feature is the integrated firewall. This firewall effectively controls incoming and outgoing traffic, offering an additional layer of protection by blocking unauthorized access to the user's network. Users can configure the firewall settings to tailor their security level according to their specific needs, ensuring flexibility and adaptability.

Desktop Protector 3.5 also incorporates advanced heuristic analysis technology. Unlike traditional antivirus solutions that rely primarily on known malware signatures, heuristic analysis examines the behavior of files and applications. This allows the software to identify and block new or unknown threats based on their potential behavior, significantly enhancing its detection capabilities.

The software's user-friendly interface makes it accessible to users of all technical backgrounds. With straightforward navigation and intuitive controls, even those who are not tech-savvy can efficiently manage their security settings and monitor their system's health.

Moreover, Desktop Protector 3.5 offers automated updates, ensuring that the security software remains current with the latest threat definitions and security patches. This feature guarantees that users are always safeguarded against emerging threats without requiring manual intervention.

Another noteworthy characteristic is its low system impact; Desktop Protector 3.5 is designed to operate seamlessly in the background. Users can work, play, or browse the internet without experiencing noticeable lag or performance issues, making it an ideal security solution for both personal and professional environments.

With its combination of powerful features, advanced technologies, and user-centric design, Internet Security Systems Desktop Protector 3.5 stands out as a reliable choice for anyone seeking to enhance their cybersecurity posture in an increasingly digital world.