73
o
Use heuristic analysis - scan the content of the page to be displayed
using the
heuristic analysis
method (dynamic emulation of the scanned
object’s instructions in a virtual computer environment).
o
Ports to be scanned - this field lists the standard http communication
port numbers. If your computer configuration differs, you can change
the port numbers as needed.
o
Maximum file size to be scanned - if included files are present in the
displayed page you can also scan their content even before these are
downloaded to your computer. However, scanning of large files takes
quite some time and the web page download might be slowed
significantly. You can use the slide bar to specify the maximum size of a
file that is still to be scanned with
Web Shield
. Even if the downloaded
file is bigger than specified, and therefore will not be scanned with Web
Shield, you are still protected: in case the file is infected, the
Resident
Shield
will detect it immediately.
o
Exclude host/IP/domain - into the text field you can type the exact
name of a server (host, IP address, IP address with mask, or URL) or a
domain that should not be scanned by
Web Shield
. Therefore exclude
only host that you can be absolutely sure would never provide
dangerous website content.