
The product provides the following options:
» Scanning of the file system for viruses and other types of malware on » Demand or according to a preset schedule;
» antiviral scanning of files on access;
» quarantining of infected files and the remedying of some of them;
» updating of databases on demand or according to a preset schedule via GPRS-Internet, Wi-Fi, EDGE or ActiveSync (for the Windows Mobile version);
» Blocking f unwanted SMS’s and calls;
» Blocking of the user’s data if the device is lost or stolen;
» Deletion of the user’s data if the device is lost or stolen;
» Protection of the device against TCP/IP protocol network attacks;
» Creation of folders in which to store encrypted files;
» allows the location of the phone to be remotely identified (if the device is equipped with a GPS receiver);
» Blocking of outgoing calls and SMS’s to specific numbers;
» allows the temporary concealment/restoration of personal information.
The easy-to-use intuitive interface helps the user to manage the product.
The product is installed in the main memory of the mobile device only.
Product components:
» Anti-Virus
» Anti-Spam
» Anti-Theft
» Firewall
» Encryption
» Parental control
» Privacy Protection

Note: It is unsigned. So hack your phone or sign it first. Click Here for hacking tutorials.
0 comments:
Post a Comment