SpyShelter Firewall - Anti-keylogger · Part I SpyShelter Firewall 3 ... - Fixed problem with...

88
© 2017 Datpol SpyShelter Firewall

Transcript of SpyShelter Firewall - Anti-keylogger · Part I SpyShelter Firewall 3 ... - Fixed problem with...

© 2017 Datpol

SpyShelter Firewall

Table of Contents

Part I SpyShelter Firewall 3

................................................................................................................................... 31 Introduction

......................................................................................................................................................... 3Why do you need it?

......................................................................................................................................................... 3Installation

......................................................................................................................................................... 4Program History

................................................................................................................................... 142 Using SpyShelter

......................................................................................................................................................... 14Alerts

......................................................................................................................................................... 18Alerts - Installer mode

......................................................................................................................................................... 19Protection

......................................................................................................................................................... 21Protection Modules

......................................................................................................................................................... 24Rules

......................................................................................................................................................... 41Log Window

......................................................................................................................................................... 42Restricted Apps

......................................................................................................................................................... 48Firewall

......................................................................................................................................................... 58Keystroke Encryption

......................................................................................................................................................... 65Settings

......................................................................................................................................................... 74About

......................................................................................................................................................... 75User Defined Protected Files

......................................................................................................................................................... 78User Defined Protected Registry Keys

......................................................................................................................................................... 81Tips

Part II SpyShelter Firewall End UserLicense Agreement 81

Index 88

3SpyShelter Firewall

© 2017 Datpol

1 SpyShelter Firewall

1.1 Introduction

1.1.1 Why do you need it?

I already have antivirus software, why do Istill need SpyShelter? SpyShelter offers significantly better methods to protect your privacy than thoseavailable in traditional security products. Conventional security products usually only look for virus "fingerprints" in order toeliminate threats and malware. Before they can be found, these "fingerprints"must be identified by the researchers in the laboratories first. This process createsa dangerous window of opportunity for these threats because, prior to theidentification of these fingerprints, they can continue to attack your computersundetected. SpyShelter is better than the other security software because, instead of relying

on "fingerprints", it actually understands how malware operates inside yourcomputer, detects them before any attack, and stops them from damaging yourcomputer. SpyShelter uses a proactive-shield technology, which is a defensive method thatmakes it possible to be protected against both known and unknown threats. Itdoesn't require any database in order to detect malware signatures, and it's ableto protect your system while using only a minimum amount of your system'sresources. This proactive real-time shield protects your personal computer against both

recently created and advanced threats. It instantly detects suspicious activity inyour computers and blocks them before any harm can be done.

Why is privacy so important? New threats and malware do not only target your system for the entertainment oftheir authors or to simply make your system crash. Many of these threats aim togain access to the user's private information such as passwords, credit cardinformation, and other sensitive data. SpyShelter aims to provide maximumsecurity for you.

G

1.1.2 Installation

Installation SpyShelter has a standard installation program.

4 SpyShelter Firewall

© 2017 Datpol

System requirements For seamless operation of SpyShelter, the system should meet the followinghardware and software requirements: Minimum Hardware Requirements:

Intel Pentium 350 MHz or higher (or equivalent) 256 MB available RAM 25 MB free space on the hard drive CD-ROM (in order to install the program from the CD)

Supported operating systems:

Windows XP 32 bit Windows XP 64 bit Microsoft Windows Vista 32 bit Microsoft Windows Vista 64 bit Microsoft Windows 7 32 bit Microsoft Windows 7 64 bit Microsoft Windows 8 32 bit Microsoft Windows 8 64 bit Microsoft Windows 8.1 32 bit Microsoft Windows 8.1 64 bit Microsoft Windows 10 32 bit Microsoft Windows 10 64 bit

Installation

1. Double-click the file fwsetup.exe. 2. The installer will start. (When installing from the CD: If the wizard doesnot auto-run when you insert the CD, then double click the CD icon.) 3. After installing the program, the SpyShelter Icon appears in the toolbar.Reboot your PC. Upon restart, you can double-click the SpyShelter icon in thetoolbar to access program.

1.1.3 Program History

Program History

10.9.1 (11/Apr/2017)

- Added support for Windows 10 Creators Update- Added import/export feature for "User defined protected files" - Added import/export feature for "User defined protected registry keys"- Used defined protected reg keys improvements with expression patterns

5SpyShelter Firewall

© 2017 Datpol

- Squashed small GUI and general bugs

10.9 (05/Jan/2017)

- Added "All except below" for IP and Ports options to Firewall Zones and Rules - Added searching for IP collisions with new Network Zones - Improved Sound record protection under Windows 8/10 - Changed logic of autoallowing registry entries in "Ask User" mode - Exec Rules: Now it's possible to input path to avoid Wow6432 issues - Changed behaviour of tooltips showing to avoid multiple alerts - Fixed freeze issues common with launching Task Manager on alert - Improved compatibility with gaming platform clients - Few small internal fixes

10.8.9 (28/Oct/2016)

- Fixed issue in export/import "no-hash" rules - Minor fixes

10.8.8 (14/Oct/2016)

- Fixed bug in App Exec common with creating more than one ignore hash rule - Translations updates

10.8.7 (13/Oct/2016)

- Added new feature to define custom protected registry keys - Extended internal registry protection feature - Solved freeze with some critical registry keys protection - Improved system protection on 64 bit systems - Added Hyper-V compatibility on Windows 10 AU Pro - Application execution rules improvements - Small improvements in GUI - Other minor fixes

10.8.6 (07/Sep/2016)

- GUI: Added option to disable lists skinning - Language updates - General small improvements

10.8.5 (01/Sep/2016)

- Added full support for new installations of Windows Anniversary Update - Improved Keystroke Encryption for Windows 10 Anniversary Update East-Asianlanguages versions - Implemented own virus scan result window + added option to rescan - Added SHA256 and MD5 hash support for custom scanner configuration - Minor fixes

10.8.4 (05/Aug/2016)

- Improved compatibility of Keystroke Encryption on Windows 10 Anniversary

6 SpyShelter Firewall

© 2017 Datpol

Update - Fixed GUI issues with disappearing translations - Repaired problem with displaying translations for some dialogs

10.8.3 (03/Aug/2016)

- Firewall driver status improvement on Windows 10 Anniversary update - Language updates

10.8.2 (02/Aug/2016)

- Added support for Windows 10 Anniversary Update- Added (new) Online Virus Scan feature- Added new feature: External custom file scanners- Decrease false alerts on Windows 10 - Improved performance of Rules Editing dialog on some systems- Fixed encrypted keys issue in Mail app(Windows 10)- Fixed security issue with protected GUI - Few minor improvements

10.8.1 (14/Jul/2016)

- Added new licensing system- Further installer improvements

10.8 (27/Jun/2016)

- Fixed updater and autoupdater bug with program malfunction after install- Fixed an issue related to installer and displaying program version number

10.7.9 (23/Jun/2016)

- Fixed rare issue with unpredictable OS behaviour while loading SpyShelterdrivers

10.7.8 (17/Jun/2016)

- Added cleaning rules feature for parent/child processes at App Exec control - Added option to improve compatibility with remote control tools- Keystroke Encryption driver compatibility improved- Fixed BSOD in KE driver on 32 bit systems

10.7.7 (13/Jun/2016)

- Removed online virus scanning feature

10.7.6 (15/Apr/2016)

- Fixed a critical issue with Windows XP 64 bit support- Fixed an issue with loading 32 bit applications under 64 bit of Windows Vista/SP2

10.7.5 (31/Mar/2016)

7SpyShelter Firewall

© 2017 Datpol

- Fixed Keystroke encryption driver load on Windows 10 32 bit - Added compatibility support for custom build of VirtualBox- French language update

10.7.4 (29/Mar/2016)

- Added support for Windows 10 Redstone Insider build 14295- Fixed hooks settings for Windows 10 Redstone Insider build 14291- Language updates

10.7.3 (23/Mar/2016)

- Improved compatibility with VirtualBox under Windows 8.x and 10- Added new option to show notifications for encrypted keys- Added support for Windows 10 Redstone Insider build 14291- Improved "Run as restricted" feature- GUI fixes

10.7.2 (9/Mar/2016)

- It's possible now to specify 64bit path while adding components- Added support for Windows 10 Insider build 14279- Fixed problem with shell context menu and "Run as Restricted" feature onWindows 8/10

10.7.1 (1/Mar/2016)

- Added support for Windows 10 Insider build 14271- Fixed issue with PID display in Alert Window- Small fixes

10.7 (24/Feb/2016)

- Added custom global network zones feature for Firewall feature of SpyShelterFirewall- Firewall rules are now allowed to use masks- Small cosmetic improvements

10.6.9 (5/Feb/2016)

- Added support for Windows 10 Insider builds 14251 & 14257- Small installer improvements and fixes

10.6.8 (29/Jan/2016)

- Added support for Windows 10 Insider builds 11099 & 11102- Fixed truncated captions issues in User Interface - Fixed visual issues with corrupted grid lines in lists - Removed Skins select feature - more info on Blog

10.6.7 (21/Jan/2016)

- Added an option which allows disabling pop-up messages for automaticallycreated rules

8 SpyShelter Firewall

© 2017 Datpol

- Improved drawing of dialog windows linked with Alert window- Fixed tray menu display issues for the disabled skin- Fixed minor color issues for Alert window

10.6.6 (15/Jan/2016)

- Fixed Network Zones icons rendering issues on Windows 10 with custom DPIscaling

10.6.5 (14/Jan/2016)

- Improved alert display as a top-level window- Fixed application crash while skin changing- Fixed rule deleting confirmation dialog focus- Various improvements with look on non standard system font size- Added support for Windows 10 Redstone build 11082

10.6 (21/Dec/2015)

- New Default GUI implemented - Various small overall bugfixes and improvements in interface- New stronger digital signatures for core application files- Language updates

10.5 (4/Nov/2015)

- Implemented Alternative View for Rules list - Compatibility improvements for gaming platforms client applications- Added support for Windows 10 insider build 10565- Decreased number of false positive alerts on Windows 10- Added program icons on App Exec Control tab- Usability improvements

10.4 (12/Oct/2015)

- Extended configuration options for AntiNetworkSpy feature- Fixed rare bug in Firewall WFP driver which caused very high CPU usage

10.3 (25/Sep/2015)

- Firewall network activity monitor now include UDP traffic- Fixed bug with multiple instances on different accounts- Fixed issue with account switching on Windows 10- Decreased number of false alerts on Windows 10- Added support for Windows 10 Insider Build 10547

10.2.1 (18/Sep/2015)

- Fixed problem with proper digital signatures recognition on some x64 systems

10.2 (18/Sep/2015)

9SpyShelter Firewall

© 2017 Datpol

- Added full Keystroke Encryption support for Edge browser- Fixed numpad digits encryption on some systems with USB keyboards- Fixed firewall bug with firewall packets filtering- Improved protection on Windows 10- Added support for Windows 10 Insider Preview build 10532- Fixed problem with disabling shell context menu integration- Fixed the update-installer on Windows 10

10.1 (28/Aug/2015)

- SpyShelter Free Anti-Keylogger now supports 64bit systems*- Free version offers now limited keystroke encryption feature- Fixed a crash that occured in Network List- Fixed a freeze problem in Windows 10- Added early support for Windows 10 build 10520- Other small improvements and fixes

*To learn more about the differences between Free and Paid editions, visit ourDownload page.

10.0 (29/Jul/2015)

- Added support for Windows 10 system- Small visual changes

9.9.1 (21/May/2015)

- Added support for East Asian languages to Keystroke encryption driver- Fixed context menu handler bug when program starts from service- Added French version of User's Manual- Few small improvements

9.8.0 (01/Apr/2015)

- Self defence improvements

9.7.2 (17/Mar/2015)

- Fixed security issue with password protection of GUI access- Farsi installer language update

9.7.1 (13/Mar/2015)

- Fixed issue with process removing in KED- Installer and general language updates- Minor fixes

9.7.0 (11/Mar/2015)

- Fixed issue with hook and improved compatibility- Added new Autoupdate feature- GUI: Sorting feature implemented for Restricted tabs, KED, Process Execution- Added new feature to block network traffic

10 SpyShelter Firewall

© 2017 Datpol

- Minor fixes

9.6.5 (18/Feb/2015)

- Self defense enhanced- Com protection improved- General protection improvements

9.6.3 (06/Feb/2015)

- Fixed problem with truncated information in alert and automatic resizing- Added Polish, German, Spanish version of User's Manual- Added Romanian GUI language- Other translation fixes and improvements

9.6.2 (10/Jan/2015)

- Fixed bug with folder/component exclusion- AppExec Rules storing issue fixed - Component name & location are fixed for some dll hooks- Minor alert changes and improvements

9.6.1 (22/Dec/2014)

- Fixed Keystroke Encryption driver issue on 32 bit systems- Japanese language update

9.6 (21/Dec/2014)

- Blocking execution feature for all processes added- New menu item in General Rules: Block component execution- Performance optimizations- Implemented rules templates with save/load feature- Action alert reorganized and redesigned- Start SpyShelter by service feature- Changed default program look

9.5 (23/Oct/2014)

- Fixed rare BSOD on Windows 8.x- Fixed bug in editing rules window on higher DPI scalling

9.4 (04/Oct/2014)

- Fixed checking for update on startup bug- Fixed new licenses issue on some systems

9.3 (02/Oct/2014)

- Added new feature: Users can now block selected host directly from Network

11SpyShelter Firewall

© 2017 Datpol

Activity tab- Added new feature: Users can now choose calculation method of sent andreceived data speed.- Improved system protection- Fixed Restricted Apps compatibility issues with Internet Explorer- Optimized GUI start time and program files size- Licensing system improvements- Few small GUI improvements

9.2 (18/Sept/2014)

- Adjusted version number to fit other SpyShelter products- Added new feature: Custom rules creator- Added new feature: Rules editor- Custom firewall network rules control implemented- Added "Network activity" under Firewall tab- Fixed bug that caused delayed taskbar response- Fixed Virtual keyboard launcher problem- Improved keystroke encryption compatibility- General compatibility and stability improvements- Several minor fixes

3.1 (01/Jul/2014)

- SpyShelter now fully supports Unicode (solves many problems with non asciicharacters)- Fixed double decryption bug of keystroke encryption driver - Fixed application freeze at system startup when 2 dialog windows are displayedby SpyShelter- Added new option to full folder exclude- Added search bar for log tab- Rules tab now contains 2 subtabs General & Application Execution Control(Firewall edition only)- Export rules to file feature improved (Firewall edition). Now App Exec Controlrules are also exported- Minor bug fixes

3.0 (13/Feb/2014)

- Support of WinXP & Vista for keystrokes encryption driver - Improved firewall protection on Win8.x- New option for advanced users: Auto allow the action for the components signedby trusted signer- Improved alert window drawing with DirectX apps- HIPS improved (for additional driver only)- Firewall: Fixed fake ICMP alert issue- Few small GUI changes- Other minor fixes

2.9 (23/Dec/2013)

12 SpyShelter Firewall

© 2017 Datpol

- Added protection against browser extension keyloggers (Firefox)- Minor installer updates

2.8 (30/Nov/2013)

- Anti keylogging module has been improved- HIPS module has been improved- Restricted applications module has been improved- Run Dialog bug on Windows 8x86 has been fixed (keys were not decrypted)- "Search" feature has been added to Rules tab- "Date" column has been added into table of Rules.- Improved Keystroke Encryption emulation (now some application work without adding them to KE filterexception list)- Chinese alert locale issue has been fixed- Several small tweaks

2.7 (25/Oct/2013)

- Windows 8.1 32 & 64 bit is now supported- Minor fixes

2.6 (15/Oct/2013)

- Webcam logging improved, new protection method added- Anti-DDE improved for Win8x64 (Only with keystroke encryption driver)- HIPS module improved- Self defense improved for Win8x64- New signers added

2.5.1 (08/Jul/2013)

- Fixed bug in installer and updater- Added new skins: Ubuntu, Gplus- Help files updates- Language files updates

2.5 (25/Jun/2013)

- Several core security updates against new malware attacks - Anti kernel mode logger support for new 64 bit systems- User defined untrused signers list is implemented - New monitoring action added- Few smaller fixes- GUI: New skin implemented

2.4 (23/May/2013)

- Keystroke encryption driver now supports 32 bit editions of Windows 7 and 8- Improved anti keylogging features on Windows 8x64- Improved process execution rules in Installer Mode

13SpyShelter Firewall

© 2017 Datpol

- Implemented new anti-sound record protection for Win8- Improved compatibility with other security software on Win8x64- Added option for log creation status- HIPS module improved to cover more areas of possible security vulnerabilities- Minor anti-keylogging improvements- Other minor improvements

2.3 (02/May/2013)

- Improved compatibility with third party software- Anti-keylogging improvements- GUI improvements - Hungarian translation added - Other fixes

2.2 (04/Apr/2013)

- Improved KeyStroke encryption driver, fixed bugs- Improved compatibility for Windows 8x64- Fixed bug with Windows 8 logon - Licensing problems fixed- New skins added (Metro UI and Windows 8)- GUI small visual bug fixes- Updates in some language GUI translations

2.1 (26/Mar/2013)

- Fixed GUI crash at program startup on some computers.- Improved compatibility(fixed OS freeze at load) with other security software on64bit systems- Small security improvements in core- Minor GUI look tweaks.

2.0 (22/Mar/2013)

- Added support for Windows 8 Free, Premium, Firewall- Keystrokes encryption driver added- Improved registry protection- Improved Anti-keylogging - Wow64 improvements- VT Fixes- Many small changes and fixes- Other GUI Fixes

1.5 (22/Oct/2012)

- Win8 32bit Support added Free, Premium, Firewall- Zeus trojan protection improvements- System protection has been improved = Free, Premium, Firewall- AntiKeylogging protection has been improved = Free, Premium, Firewall- Removed some false positives for system and anti-keylogging protection = Free,

14 SpyShelter Firewall

© 2017 Datpol

Premium, Firewall- Added Cleanup feature for Process Execution Rules = Firewall only- Added new context menu items for Process Execution Rules = Firewall only- Added showing command line parameters for process execution alerts on Vista+= Firewall only- Update rules Dialog = Free, Premium, Firewall- Several small visual fixes in displaying skins- Various smaller FIXES

6.1 (17/Feb/2012)

- First public release of firewall edition

1.2 Using SpyShelter

1.2.1 Alerts

Alerts After detecting any suspicious activity, SpyShelter will show this alert window,which contains information about what's happening in the system.

After clicking on Details of component, a window similar to the one below will

appear:

15SpyShelter Firewall

© 2017 Datpol

Signed:The possible options are Yes or No.This means that the application is digitally signed by the publisher. Usually,signed apps can be trusted. Signer:This contains the name of the company [or the signer's name]. You can thencheck the background of this company to find out more about the type of softwarethey develop. Path:Path to the file File size:Shows the file size in bytes. Hash:A series of characters that defines the program that is running. If you click on Disable monitoring of action you see the following window:

16 SpyShelter Firewall

© 2017 Datpol

Here you can either choose to disable the relative module or to disable themonitoring of the current action.If you choose to disable the module, all actions of this module will be allowedfor all components, whereas if you choose to disable the monitoring of theaction, just that specific type of action won't be monitored anymore. In the main window, you also have other options: Analyze file with ViruScan.Jotti.org

This option allows to scan the file with multiple AntiVirus engines on Jotti.orgwebsite. SpyShelter will send the selected file hash to the Jotti.org scanningservice to see if the file was already scanned. If the file was never scanned before,SpyShelter will upload it to Jotti.org and present you with the results. If the filewas scanned before, you will be presented with known results and the possibilityto scan this file again by pressing Scan again button. By pressing this button,SpyShelter will upload the file to Jotti virus scanning service and display updatedresults.

17SpyShelter Firewall

© 2017 Datpol

Note: Negative result (0 viruses found) does not always mean that file is legitand does not contain harmful code.Remember also that many antivirus engines' scanners often raise "falsepositives", especially with protected/compressed code, so not every detection hasto be malicious. Apply the choice to all actions for current component:When this option is selected, SpyShelter will apply your choice to all other actionsof given component (SpyShelter will automatically allow/block/terminate all

activities of the component). Remember my choice:When this option is selected, a rule is created in the Rules tab and stored in the

program. This way, the next time that you run SpyShelter, the program willautomatically make decisions based on the stored rule. You also have the possibility of entering the Installer mode (see relative section).

Please keep in mind that the SpyShelter will sometimes prompt you even withregard to traditionally "safe" programs. This is because of many program settingslike a global hook. It is therefore recommended that you read all the informationabout the signer's identity and the path to where the application is supposed to

18 SpyShelter Firewall

© 2017 Datpol

be installed. For example, if a window appears about the instant messenger that you trust,then there is no need to worry and its corresponding actions can be allowed. When you are not sure what action to take, it is generally recommended that youinitially block the program. If your system remains stable even when the programis running, then you can remove this application from the black/white list andallow it to run. As a rule of thumb, signed programs are safe. However, for added protection, youcan check the signer's name to see what type of software this company producesand you can also check the installation path. Beside the Allow or Deny action you have also possibility to "Terminate" theprocess.NOTE: When the system is terminating a process, it does not terminate any childprocesses that the process has created. NOTE:Once process is terminated it's stored to rules list and rule is created so, nexttime when this process will run it will be automatically terminated. Depending on the setting:"Apply the choice to all actions for current component"It will terminate one specified action or all suspicious actions.

1.2.2 Alerts - Installer mode

Alerts - Installer mode Installer applications and software updaters may need to be auto-allowed to beable to execute other processes (called 'Child Processes') in order to decrease theamount of false alerts.SpyShelter installer mode will make the process of installing new applicationseasier. When you try to install a new application, SpyShelter will try to detect theinstaller mode and will show the caption Installer mode in bold at the bottom of

the window that appears. Clicking on the Installer mode will show a confirmation alert like the one showed

below:

19SpyShelter Firewall

© 2017 Datpol

Select Yes to allow the execution of child processes with the same rights as theparent process.

1.2.3 Protection

Protection tab SpyShelter has a user-friendly interface and is very easy to use. SpySheltercontains many different modules designed to protect your computer frommalicious software and to provide it with full protection against threats andattacks. These modules protect your information and private data from unlawfuland malicious attacks. The program's user interface consists of a few sections. The first one is the

Protection tab:

Here you can start or stop the general protection for all modules, and also enable

20 SpyShelter Firewall

© 2017 Datpol

or disable specific security modules. To do so, you just need to click on the smallbulb icon on the right of the module's name.

- This indicator turns off/on general protection for all modules (you canswitch by clicking on the indicator). If you want to just temporarily turn off the protection, please follow theinstructions provided in the window that will appear (you can see it below).

Note:When you disable protection on your machine, malware that has been blockedmay infect your system. It is recommended that in order to ensure full protection, you restart your systemwhen requested to do so by the application. SpyShelter protection consists of several modules that perform differentfunctions: Anti Keylogger:Protects your system from KeyLoggers. Screen Protection:Protects your system from Screen Loggers.

Clipboard Protection:Protects your system from Clipboard Loggers. Anti GetText:Protects your system from text capture using the gettext function. System Protection:Protects sensitive areas of your system from malicious applications. Anti Kernel Mode Logger:Protects your system from advanced kernel mode keyloggers. Webcam Protection:Protects your system from WebCam Loggers.

21SpyShelter Firewall

© 2017 Datpol

Sound Protection:Protects your system from VOIP voice loggers used, for example, with today'sinstant messengers. Firewall:Complex Firewall module which monitors inbound and outbound connections.

Note:64 bit editions of Windows have a built-in protection system called PatchGuardwhich limits the ability of System Protection module (32 bit editions are fullyprotected). Although, even with PatchGuard, SpyShelter still provides additionaland very important protection to the 64 bit editions.

1.2.4 Protection Modules

Anti Keylogger The Anti-KeyLogging Module is designed to provide protection against allkeyloggers. Information security is checked proactively without requiring asignature database. Keylogging can be performed in several different ways. SpyShelter stops allkeyloggers, whatever their logging methods are. In addition to this, thanks to itsproactive protection methods, the Anti-Keylogging module protects your

22 SpyShelter Firewall

© 2017 Datpol

computer against new (and yet unidentified) threats too. A Keylogger is a malicious application that infects your computer and logs allkeyboard actions (keystrokes). Every key you press is saved. These records can bestored locally in a place inside your computer or even in remote places. Keyloggers are designed to steal high-value information that a user may divulgewhile using the Internet (for example when a user is using this kind of services:e-shopping, e-commerce, e-banking, mailing and etc.) To address these threats,virtual keyboards have been used especially for internet banking transactions.However, traditional methods to protect a user against Keyloggers and theirthreats are not enough compared to the protection that SpyShelter can offer.

Anti Kernel Mode Logger This is a unique security module that protects your system against advancedkernel-mode keyloggers. Kernel-mode keyloggers work on a driver or on a service level and are verydifficult to detect using conventional protection software. SpyShelter hasdeveloped a protection method against these threats too. Anti GetText Hackers could use the GetText function to obtain important information from yourcomputer. This module prevents the use of this technique, that is used to grabsensitive data from your computer. Screen Protection This module protects your system against Screen Loggers: these are programsdesigned to use the screen capture feature to steal your data. They operate byregularly making screenshots of your desktop in order to capture the informationshown on screen. Webcam Protection Webcam Loggers secretly connect to your web camera. They take pictures andsend the information across the Internet. Many of these programs can operateeven when your webcam is not visibly activated. This threat has become morerelevant nowadays, considering that web cameras are already built-in in almostevery modern laptop. Just think of all the possible information that could begathered through your web camera! Everything you do when you are working onyour computer can potentially be recorded and used maliciously. The Anti Webcam Capture Module provides a unique proactive protection againstthis threat. Thanks to this proactive protection, SpyShelter can also protect youfrom unknown threats of this kind. Clipboard Protection The Clipboard is a place where data is stored when changes are being made

23SpyShelter Firewall

© 2017 Datpol

during the cut, copy, and paste process. Clipboard Logger Software monitorsinformation contained in the clipboard. By checking if changes are made inside itand by controlling what is stored in it, this type of software is able to capture dataand send it to a third party. The Anti-Clipboard Logger Module works in real-time: it protects you againstthese threats before they happen and as they happen. The Anti-Clipboard Logger Module, thanks to its powerful anti-action methods, willelevate information security and protect your vital data in ways that have neverbeen made possible with more traditional protection software.

System Protection Your computer has important system areas which, when harmed, can causeoverall system instability. These areas include the Windows Operating Registryand the physical RAM. SpyShelter System Defense Module is a proactive component that protectsimportant system areas against any malicious software that might harm yoursystem. As it protects your system, it also prevents any malicious applicationsfrom injecting malicious codes [DLL injections] into trusted components. The SpyShelter System Defense is equipped with anti-action methods to preventthis from happening. In addition, it blocks malicious applications that use KernelDriver Loading: these infect the system by installing code into your computer’soperating system. This module also protects you against malicious applications that can modifyvalues inside the Windows Registry. The System Defense Module can protect the most important areas of your system.It's also able to prevent malicious applications from putting any module ofSpyShelter out of operation. This is a proactive method of protection. SystemDefense Module does not only protect you against known threats but also protectsyou against unidentified and unknown threats. Unique Protection System Against Malware System Malware directly attacks your operating system. The main attack methodsare: •Global Hook Installation•Rootkit Installations•Thread Context Changing•Direct Physical Memory Access•Remote Thread Creation•DLL Code Injection•Kernel Driver Loading•Program State and Memory Modification•System Critical parts Registry Modification

24 SpyShelter Firewall

© 2017 Datpol

If a malware infiltrates into your system, it may cause system instability. Youroperating system may become unstable. The system usage level can be changed,causing many undesirable effects in your system hardware. In conclusion, whenthe operating system and its hardware are damaged, you will risk losing yourvaluable data and you will also experience financial damage. SpyShelter's System Defense Module is designed to protect you against malware,thanks to its proactive protection method.

Sound Protection This is a unique security module that protects your system against VOIP soundtrojan loggers. It can be useful when you use instant messengers to make voicecalls. Webcam trojan recorders may try to store voice data from your built-in orexternal microphone. This module will give you better protection against this kindof threat.

AntiNetworkSpy SpyShelter AntiNetworkSpy proactive module prevents dangerous trojans fromstealing your private information during important SSL internet transactions. Itblocks HTTP/HTTPS logging and also POP,SMTP,FTP and other loggers as well. InSpyShelter Firewall, AntiNetworkSpy module is integrated into Firewall module.

Firewall SpyShelter firewall module is designed to control (permit or deny) networktransmissions based upon a set of rules.It's commonly used to protect computer system networks from unauthorizedaccess, while permitting trusted communications to pass.SpyShelter Firewall supports IPv6 protocol.

Keystroke Encryption

Keystroke Encryption driver encrypts your every keystroke. Additionally, thisfeature blocks other applications even from receiving those encrypted keystrokes.Typed keystrokes are sent via safe tunnel only to this application, on which yourkeyboard is focused.

1.2.5 Rules

Rules tab

General

The General tab displays any rules that you created responding to security Alerts.

It contains information about allowed and not allowed components that have beendetected by the SpyShelter, because of their suspicious behavior.

25SpyShelter Firewall

© 2017 Datpol

At the top of this tab, you can see a series of icons. Everyone of these performs acertain action. In order from left to right:

Switch to alternative view:This function allows to change the way Rules are displayed. Instead of a classiclist of Rules, it lists all components that have rules associated to them. When youclick on a component, all the rules of the given component will be displayed in awindow below.

26 SpyShelter Firewall

© 2017 Datpol

Create custom rule:This allows you to create a fully customized rule for any file. Just select a path tothe file (component) and define which actions you want to allow or deny.

27SpyShelter Firewall

© 2017 Datpol

Custom Network Rule:This feature allows you to define advanced network settings for the component.

In order to create new custom network rule, select the component (file) path,click on the "Custom network rule" dropdown and choose Select.

28 SpyShelter Firewall

© 2017 Datpol

A new window will pop up, which will allow you to manage your custom rulepresets. Click on Create to create new one. You can also Edit the existing rule byselecting it and then pressing the Edit button.

29SpyShelter Firewall

© 2017 Datpol

General

Rule name:You can set up any name for your rule.

Rule Type:Select if you want to allow or deny network traffic in this rule.

Protocol:Choose which protocol should be used.

Direction:Choose if you want to create a rule for ingoing, outgoing, or for both directions oftraffic.

ICMP Traffic:Check it if you want to apply this rule to ICMP traffic.

30 SpyShelter Firewall

© 2017 Datpol

Incoming requests

Provide a list of IP addresses and ports for all ingoing requests that you want tofilter.

Press icon to add new address, and to remove the existing one.

31SpyShelter Firewall

© 2017 Datpol

After you click , new window will appear. Choose a Protocol, Single IP or IPrange, and input the IP number(s).

It works exactly the same for Ports.

32 SpyShelter Firewall

© 2017 Datpol

Outgoing requests

Provide a list of IP addresses and ports for all outgoing requests that you want tofilter.

Press icon to add new address, and to remove the existing one.

After you click , new window will appear. Choose a Protocol, Single IP or IPrange, and input the IP number(s).

33SpyShelter Firewall

© 2017 Datpol

It works exactly the same for Ports.

You can also perform a test of your newly created rule by pressing the Testbutton.

Select Protocol, Direction, Input IP, and port and press test button to see if theconnection will be blocked.

34 SpyShelter Firewall

© 2017 Datpol

Rule editor:This option allows you to edit the rules of the selected component.

Saving rules:Once you customize the rules, you have the ability to save them as a template bypressing the "Save..." button at the bottom-left corner of the window.

Loading rules:You can load your saved rule template by pressing the "Load..." button located at

35SpyShelter Firewall

© 2017 Datpol

the bottom-left corner of the window. Select a saved rules template and press OK. Loaded rules will overwrite existing rules.

Import rules from file:If you already have a series of rules saved into a file, you can import it into theapplication, without having to set the rules one by one. Export selected rule(s) to file:You can select one or more actions (if you want to select more than one, keeppressing the Ctrl button while clicking on the items you want) and export them toa file. Export all rules to file:This makes it possible to export all the rules you have set to a file. This option canbe useful when, for example, you want to make a backup of your rules. Remove rule(s):You can delete one or more rules from your list. If you want to delete more thanone rule at the time, press Ctrl, while selecting the items you want to remove. Remove all rules:Selecting this action will erase all the rules that had been previously set. Cleanup rules:If, after adding a folder to the list, you happen to delete this folder from the harddisk, this option gives you the possibility to clean all the rules that may still referto the erased folder because they are not needed anymore.

36 SpyShelter Firewall

© 2017 Datpol

Exclude file:If there are some files that you want to exclude (meaning, that you don't want toblock), you can add them to the exclude list. This way, all the action for thesefiles will be allowed. Exclude folder:This action is the same as the previous one, but in this case you can add an entirefolder to the exclude list, with two options.

Exclude only those files that exist in this folder at the moment- This optionwill exclude all the files present in the folder while creating this rule. This meansthat if you create/move new files into this folder after excluding it, those files willnot be excluded. It is the safest choice.

Exclude existing files and any future files in this folder - This option willexclude all currently existing files in the folder as well as all future files. It is lesssafe than first option; however, it might be useful for users who often modifyfiles.

Note: A file that has been edited is considered as a new file.

37SpyShelter Firewall

© 2017 Datpol

Find all rules of component:This function will show you all the rules created for currently chosen component. Component details:This action lets you see the details of the selected item, including if theapplication is signed or not, the signer (if there is one), the path to the file, thefile size and the hash of the file.

Block the component execution:Allows you to completely block the component execution. By right-clicking on a line, a menu containing all these actions will appear, as youcan see in the screenshot below:

Search bar:This field allows you to filter the Rules in order to find specific entry. You cansearch for the Component name and Path.

38 SpyShelter Firewall

© 2017 Datpol

When you click on an item in the list, at the bottom of the window you will see acomment that will explain what action the selected component is trying to do. Example Component name: example.exe Allow: Yes means that you allowed the ActionType: action type num ber forexample.exe. You can also see the path to example.exe, together with theprotection module relative to the component. By removing an item from the list, the program will automatically analyze thecode once it detects it and will then ask you if you want to allow or disallow itsoperation in your system.

Allow column icons

Rule allows the action and was created manually by the user from a prompt. Rule allows the action and was auto created based on your Security settings Rule blocks the action and was created manually by the user from a prompt.

Application Execution Control

This tab contains rules based on which SpyShelter makes a decision to block orallow the execution of application. The top part contains a list of parent processapplications. The bottom part contains list of child process rules for the selectedapplication (process) in top part.

39SpyShelter Firewall

© 2017 Datpol

You can create new Application Execution Control rule by pressing right mousebutton on the desired component.

40 SpyShelter Firewall

© 2017 Datpol

You can select the file by pressing "..." button on the right or you can manuallyinput the path to the file. Please note that it will be impossible to press OK buttonif you specify wrong file path.

Specifying 64 bit paths for manually added components.

It is possible on 64 bit systems to specify system32 paths by choosing“sysnative” shortcut when manually creating a rule. The sysnative folder is visiblein the file selection window, just like below:

41SpyShelter Firewall

© 2017 Datpol

1.2.6 Log Window

Log Window tab

42 SpyShelter Firewall

© 2017 Datpol

Here you can see all the action history ordered by the time it happened. Allentries are stored for one session of the application only. If you need to have a fulllog of the activities you must use the option described below. Append log:When this option is checked, SpyShelter stores the log to file. You can view itlater by right-clicking on an entry and choosing View log file.

When you right-click on an item you will be presented with two options: View log file:This option lets you look at the log file of the last session of the program. Erase log:This option will erase all the items currently listed and the entire log file from thelast session of the program.

Search bar:This field allows you to filter the log file in order to find specific entry. You cansearch for Component name and Path. When you click on an item in the list, at the bottom of the window you will see acomment that will explain what action the selected component is trying to do.

1.2.7 Restricted Apps

Restricted Apps Restricted Apps feature (previously Sandbox) uses a restricted SID and hooks inorder to protect your PC. This features allows you to choose applications that youwant to run with lower privileges. Applications running in restricted mode havelimited access to system resources such as registry keys, files, webcam,microphone, keylogging, hooks installing, usual administrative tasks (such asstopping, registering, running services and drivers) and so on. Other restrictions for applications running in restricted mode include:1) Registry hive HKLM are not writeable (access to other registry keys can be alsolimited).2) Restricted file access (as you can see in the appropriate SpyShelter tab).3) Restrictions on other system objects (based on system security settings).4) All dangerous actions are blocked automatically for applications running inrestricted mode.5) Children of restricted processes are also restricted. This mode can be used for running Web browsers, email clients, instantmessengers, or any unknown program.

43SpyShelter Firewall

© 2017 Datpol

Information tabThis tab simply contains information about this feature.

Restricted Apps list tabThis tab contains the restricted applications.

44 SpyShelter Firewall

© 2017 Datpol

The three small icons at the top let you perform several actions: Add file:You can select a file to add to the list (i.e. an application that you want to executeas restricted). Add folder:You can also add an entire folder, instead of a single file. In this case, all theapplications contained in the selected folder will be executed as restricted. Remove item:If you want to stop an application from being executed as restricted. If you right-click on an item or inside the window, a menu will appear, with somemore options available (as you can see in the screenshot below):

45SpyShelter Firewall

© 2017 Datpol

Add removable drives:You also have the possibility to add removable drives (CD-ROM, floppy disks andflash drives) to restricted mode. This way, all the applications contained in thesedrives will be executed as restricted. Run as unrestricted:If you right-click on an application and you select this option, the application willstop being executed as restricted. You can also allow the applications in this list to capture images from the webcamand to record sound. Usually, these two options are automatically checked whenyou add an application to the list. If this is not what you want, you just need toright-click on an item and select Deny webcam capture and/or Deny soundrecord. You can also control these options by checking or unchecking them at the bottomof the window. Folders with write access tabIn this tab you can see the folders to which you have granted write access.

46 SpyShelter Firewall

© 2017 Datpol

By right-clicking on an item you will make a small menu appear, from which youcan perform the following actions: Add folder:Add a folder to the list. Add special folder:There are some particular folders, which you can add in a faster way with thisoption. These folders are App Data, Local App Data, My Documents, Cookies,Desktop, Temporary Internet Files and History. Add access for removable drives:If you wish, you can grant write access to removable drives too (flash cards andUSB drives). Remove item:Remove a folder from the list. File access violations tabThis tab shows an entry whenever a file access is blocked.

47SpyShelter Firewall

© 2017 Datpol

You can see information about the time when the file access has been blocked,the path to the file, the name of the process that has tried to gain the access, andthe PID of the process. If you right-click on an item a menu containing thefollowing options will appear: Add write access for folder nam e_of_the_folder:This option lets you change the permissions of the selected file. Refresh the list:Check if new actions have been blocked. Clear the list:This option erases all the warnings. If you don't want the warning list to refresh automatically, you can check theoption Lock automatic list refresh at the bottom of the window. Since apps that are executed in restricted mode are not allowed writing access toall folders, you can see here if some of these applications' attempts to gain writeaccess to a folder have been blocked. This way you can give them the rightpermission to be sure that they can continue to function properly, even if they areexecuted as restricted. Executed as restricted tabIn this tab you can see all the apps that are running in restricted mode.

48 SpyShelter Firewall

© 2017 Datpol

You can remove an application from the list by right-clicking on its name andselecting Terminate process, or you can simply click on the application you wantto remove and press the "Del" key.

1.2.8 Firewall

Firewall tab Network Zones tabThis tab contains network zones(e.g. ip ranges) where access is allowed (TrustedZone type), blocked (Blocked Zone type), or undefined (Undefined Zone Type).

The user may put local networks to Trusted Zone and Spyshelter will auto-allowrequests when the application is trying to get access to this local network (forexample when file sharing is used)

The user may click on the 'Detect private networks' label and Spyshelter will try todetermine local networks automatically

49SpyShelter Firewall

© 2017 Datpol

You can also left-click on an entry in the Zone column to change the Zone type:

New/Edit Zone - Basic Zone

You can add new zones by clicking the + button or or edit existing zones byclicking Edit button, double-clicking an existing zone or pressing right mousebutton on the zone and choosing Edit option from the menu.

Description: Name/description of network zone.Zone: Trusted means all requests to access this networkwill be auto-allowed.

50 SpyShelter Firewall

© 2017 Datpol

Blocked means all requests to access this networkwill be auto-blocked.

Undefined means all requests to access this networkwill prompt for authorization.All IPs except those specified below: Checking this option will make thecreated rule apply to all other IP addresses and ports than those specified in therule. For example, it may allow you to block all outgoing connections except toone IP address.Address type: Determines whether the zone is specified by an IPaddress with mask, IPv4 address range, or IPv6 address range.First/Last IP or IP/Mask: IP address range or mask specifying network zone.

Advanced Zone options

"Advanced..." button opens up a new window which allows to set up customglobal firewall rules. In other words, it allows to set up Network Zones where it ispossible to define custom network rules for specified Network Zone. This optionallows to adjust various settings like defining IP Range, Mask, specifying Ports,Protocol and more. With this feature you can define rules which will allow/block allincoming and/or outgoing connections to/from specified IP addresses and ports,using a given protocol.

Note: Advanced Network Zones override the custom firewall rules of components.

General tab

51SpyShelter Firewall

© 2017 Datpol

Rule name: This field allows to define a name for your Network Zone which willbe displayed in 'Description' column of your Network Zones tabZone Type: Allows to define whether the given should be Allowed or Blocked.'Unspecified' option will cause the Zone to act as if the Zone was not created, i.e. it will not block anything.Protocol: Protocol which should be blocked. You can filter the connections by TCP, UDP and TCP or UDP together.Direction: Direction of the connection. You can filter outgoing connections,incoming connections and both incoming & outgoing connections.ICMP traffic: Enabling this option will apply settings of this rule to ICMP traffic.

Incoming requests

This tab allows to define the IP adresses and Ports of incoming requests whichshould be filtered by the specified Zone Type.

Outgoing requests

This tab allows to define the IP adresses and Ports of outgoing requests whichshould be filtered by the specified Zone Type.

52 SpyShelter Firewall

© 2017 Datpol

All IPs except those specified below - Checking this option will make thecreated rule apply to all other IP addresses and ports than those specified in the

53SpyShelter Firewall

© 2017 Datpol

rule. For example, it may allow you to block all outgoing connections except toone IP address.

Allows to specify IP/IP range/IP and Mask or Port/Port Range. You can entermultiple entries into one Network Zone.

Allows to edit selected IP/Port.

Allows to remove selected IP/Port.

It is possible to define a Single IP, IP Range and a Single IP with a Mask.

A Port and Port Range can also be defined. This feature allows to allow/blockconnections (depending on the Type of your Network Zone) using the specifiedports.

You can also perform a test of your newly created rule by pressing the Testbutton.

54 SpyShelter Firewall

© 2017 Datpol

Select Protocol, Direction, Input IP, and port and press test button to see if theconnection will be blocked.

Once advanced network zones is created, it displays 'Custom' value in 'Address'column of Network Zones tab.

If any of the Advanced settings are changed, the Basic Network Zone editingwindow will no longer appear. Instead, Advanced editing options will be available.

Zone collision detection

If you create multiple rules that apply to similiar IP adresses/Ports, SpyShelterwill notify you about it while creating the rule.

55SpyShelter Firewall

© 2017 Datpol

Network Activity

This tab allows you to watch which applications are currently connected to theInternet and how much data they send and receive.

56 SpyShelter Firewall

© 2017 Datpol

By pressing the right mouse button on the Upload Speed and Download Speedyou can change the displayed speed from the current to the average speed.

57SpyShelter Firewall

© 2017 Datpol

You can also double click on a process to reveal servers it is communicating with.

If you want to block the connection to a specific remote server, right click on itand choose the Block option.

58 SpyShelter Firewall

© 2017 Datpol

Network TrafficYou can block all network connections by right clicking on the SpyShelter icon thetray menu.

After you block connection, you can easily unblock it the same way.

1.2.9 Keystroke Encryption

Keystroke Encryption

The KeyStrokes Encryption driver encrypts your every keystroke. Additionally, this

feature blocks other applications even from receiving those encrypted keystrokes.

Typed keystrokes are sent via safe tunnel only to this application, on which your

keyboard is focused. Keystroke encoding starts before logging into your Windows

account - It's an independent solution. All of your important private information

will be securely scrambled from the moment you start your PC and is practically

useless for various keyloggers and dangerous applications.

It currently supports both 32 and 64 bit operating systems and is available in

59SpyShelter Firewall

© 2017 Datpol

SpyShelter Premium and SpyShelter Firewall.

Turning Keystrokes Encryption on

Keystroke Encryption can be turned on only by using SpyShelter installer. So, if

you don't see Keystrokes Encryption tab, you need to download installer of the

product you own.

1) If you have installed SpyShelter and want to add Keystrokes Encryption feature:

Run setup, and check 'Install additional driver for keystrokes encryption and

extended protection' box.

60 SpyShelter Firewall

© 2017 Datpol

And proceed with installation. Reboot your PC after you do this.

2) If you are installing SpyShelter for the first time and want to turn on the

Keystrokes Encryption:

Check 'Install additional driver for keystrokes encryption and extended protection'

on the screen where you choose Protection level.

61SpyShelter Firewall

© 2017 Datpol

And proceed with installation.

Process Filter tab

Process filter tab enables you to manage processes, such as which keystrokes will

be encrypted by the encryption driver. You can add or remove them using and

buttons.

Encrypt keystrokes of all processes - Checking this option will encrypt

keystrokes of every process.

Encrypt keystrokes of processes specified below - Only processes from the list

will be encrypted. Using the buttons below the list, you can add processes and

remove them.

Do not encrypt keystrokes of processes specified below - Processes from the

list will not be encrypted.

Disable keystrokes encryption - Disables keystrokes encryption completely.

System processes encryption is turned off by default in order to prevent problems

during logging into your Windows account.

62 SpyShelter Firewall

© 2017 Datpol

Select a process from the list... - Allows to select running process and add it to

the list.

63SpyShelter Firewall

© 2017 Datpol

Input process name - Allows to add a specific process name to the list .

<System processes> - Adds all system processes.

<Console processes> - Adds all console processes.

Advanced tab

Enable East Asian Languages Support - This option allows to enable/disable

kesytroke encryption for East-Asian characters.

Show tooltip notification when keystrokes are being encrypted - Allows to

display tooltip system notification when keystrokes are being encrypted.

Emulation

These options should be changed only by advanced users or those who experience

issues with the key encryption driver.

Unchecking the options in Emulation group can make anti-keylogger protection a

little better but less compatible.

The application (on which your keyboard is focused on) is able to read the

encrypted keystrokes using various functions.

By checking/unchecking options in Emulation window, you choose which system

functions will be able to read encrypted keystrokes.

64 SpyShelter Firewall

© 2017 Datpol

Hooks Guard

Hooks Guard is self defense feature that helps to protect against various

keyloggers.

Better protection mode - it's recommended to keep using this option, since it

offers better protection. If there are no compatibility issues, it shouldn't be

changed.

Better compatibility mode - check only if experiencing problems with Keystrokes

Encryption.

Using SpyShelter's Keystrokes Encryption with other keystroke encryption

software

If experiencing any problems, use Process Filter feature and add iexplore.exe to

exception list.

NOTE: On Windows XP Keystroke Encryption installs in Better compatibility

mode by default in order to fix possible IE compatibility issue.

65SpyShelter Firewall

© 2017 Datpol

1.2.10 Settings

Settings tab In this section you configure several options for the program. General tab

Language:Here you can choose the language of the program. The available options are: - Brazilian Portuguese- Chinese- Traditional Chinese- Croatian- Czech- English- French- German- Italian- Japanese- Macedonian- Polish- Serbian- Spanish- Turkish

66 SpyShelter Firewall

© 2017 Datpol

- Danish Program autostart:Check this option to start the program everytime Windows is booted.

Launch the program as a service (early start)Turning this option on will cause SpyShelter to install a service in your systemwhich will allow SpyShelter to start earlier.

Check for update at application startCheck if updates are available everytime you start SpyShelter.

Enable automatic updateThis option allows you to turn on automatic updates. Once new version isreleased, SpyShelter will automatically update itself in the background. Afterthe upgrade is done, SpyShelter will prompt you to restart your system.

Context menu shell integrationIf ths option is enabled few additional items with SpyShelter functions will beadded to the standard file and folder context menus, which appear when you clickthe right mouse button on a file icon in Explorer or Desktop. Add *RESTRICTED* window caption prefix for restricted GUI appsCheck this option if you would like to see the word *RESTRICTED* before thename of the app in its window and when the application is reduced to tray.

Auto-clean rulesRules which apply to old unexisting files will be removed from the Rules list if thisoption is enabled.

Show 'Update Rules' dialogWhen an application which was in Rules list gets modified, SpyShelter will showup an alert windowing informing about the file modification and ask if old rulesshould apply.

Create rules in Installer modeSpyShelter will create Rules for an application while using Installer Mode option.

Enable list stylesThis option is responsible for styles of lists in SpyShelter. Disabling it, removesthe custom SpyShelter style and replaces it with the system one. This results inspeeding up scrolling experience.

Security tab

67SpyShelter Firewall

© 2017 Datpol

Certified applicationsHere you can define how the SpyShelter Firewall will behave with signedapplications. The available options are:

Auto allow - High security levelBased on our internal rules, this will automatically allow certain non-signedapps, without prompting you. This happens when SpyShelter Firewall hasalready identified and classified these applications as safe. Allow MicrosoftWith this option, only Microsoft-signed applications are automatically allowed.If an application is not signed by Microsoft, the SpyShelter Firewall will ask youif you want to allow or disallow it. Auto allow - Medium security levelBased on our internal rules, this is a balanced option between high security anda lower number of false alerts. This is the recommended option for non-advanced users. Ask userWhen the user activates this option, the program will prompt them asking whatthe desired action is (allow or deny) for every program that might exhibitsuspicious behaviour.

User defined protected registry keysClick here to read more.

User defined protected filesClick here to read more.

User defined signers list:

68 SpyShelter Firewall

© 2017 Datpol

This feature allows you to manually add and delete trusted and untrusted digitalsignatures. Applications with trusted signatures will run by default, whileuntrusted ones will not. Use this feature with caution, since some monitoring programs can bedigitally signed if they are commercial products.

Configure external file analyzerSpyShelter allows to configure a custom external file analyzing service. Thedefault file analyzer is provided by Jotti.org. To use your preferred analyzer, youneed to make sure that it offers a downloadable client. Once you install it, you canstart to configure SpyShelter.

You can add new, edit and remove file analyzers using the navigation menubuttons.To add a new scanner, click on the + icon.

69SpyShelter Firewall

© 2017 Datpol

Enter the Name of your file analyzer - it will be displayed in Alert window. In command line field, you need to point to the executable file of your scannerand include {FILEPATH} at the end of it, just like on the screenshot above. Youcan double click on {FILEPATH}, {SHA1}, {SHA256}, {MD5} in the bottom tableto quickly add them to command line.

It is also possible use this function to quickly look for the results by searching forexisting results by utilizing the SHA1 hash.Example of a command line used to check SHA1 of the file:

C:\Program Files (x86)\Mozilla F irefox\firefox.exe https://virusscan.jotti.org/p l-PL/search/hash/{SHA1}

Command line presented above, will open firefox.exe, and then go to https://virusscan.jotti.org/pl-PL/search/hash/{SHA1} address, where {SHA1} is theSHA1 hash of the scanned file. If the file exists in the database of given fileanalyzer, it will show the scanning results without having to upload whole file.

70 SpyShelter Firewall

© 2017 Datpol

In the alert window, you can see the Analyze file with VirusScan.Jotti.org text.After you click on it, a new window with an option to select your custom analyzerwill show up.

Select your external file analyzer, press OK and the file will be scanned by it.

List of processes which are not monitored by AntiNetworkSpy module

71SpyShelter Firewall

© 2017 Datpol

Thanks to this option you can exclude components from being monitored byAntiNetworkSpy Module.

Enable showing tooltips of autoallowed signed filesThis option allows to disable system tray pop-up messages which inform aboutautomatically created rules. Those notifications can also be disabled in WindowsNotification settings.

Enable showing tooltips for blocking network hooks actionsThis features enable tooltips in tray which informs for example about dll injectionsor ssl loggers or other hooks.

Administrators' right required to access GUIOnly administrators will be allowed access to the user interface. When a user isusing a guest account, accessing the GUI will not be possible. Password protectionThe user can define a password for accessing the user interface. Auto-block suspicious behaviourIf this option is selection, applications with suspicious behavior will beautomatically included in the black list. Launch virtual keyboard at logonThis feature is available only for the 32bit OS. When enabled, a launch virtualkeyboard button will appear when the user logs on. This is very helpful when theuser wants to securely log into an account but is not sure if his keyboard has abuilt-in hardware keylogger. Advanced tab

72 SpyShelter Firewall

© 2017 Datpol

Terminate child processes - terminate the process created by the suspiciousmodule which raised an alert Terminate all instances - kill all processes with the same path as the suspiciousprocess Block dll loading from removable drives - Check this option if you don't wantthe dll files to load from removable drives (external hard disks, flash memories,USB drives). Some trojans use this technique, so you might find it useful to checkthis options. Use hard hooks - Uses hard hooks (help enforcement hook setting when othersecurity application is installed and there is problem with compatibility) Block registering of non exist driver - with this option OFF, you can disable

displaying false alerts with non-existing drivers, which happens with someinstallers update programs and so on..

List of monitored actions tab In this tab you can see a list of all the actions that are being monitored in yoursystem.

73SpyShelter Firewall

© 2017 Datpol

By default, all the actions are monitored. However, if you prefer to stopmonitoring one, you simply need to uncheck it.

Auto-allow the action for a component signed by a trusted signer - Bydefault SpyShelter auto-allows all actions performed by a trusted component. Youcan select any Action Type from the list and uncheck this box in order to disallowit.

74 SpyShelter Firewall

© 2017 Datpol

1.2.11 About

About tab

Help:Runs this help file. Check for update:Select this option if you want to check if a newer version of the program isavailable (internet connection required). If you want to use a proxy, just select Use proxy and enter the address and the port number (see the screenshotbelow):

Report Bugs;Use this tool, if you want to submit bugs you noticed.

75SpyShelter Firewall

© 2017 Datpol

1.2.12 User Defined Protected Files

This feature is for advanced users only.

By default SpyShelter protects critical system files. With this feature you can

define your own list of file and folders and protect your sensitive data against

unauthorized access, for example by ransomware.

SpyShelter will prompt an alert window if one of the listed files will be accessed by

a process. Each new process which will try to access the file will generate new Alert

window. The alert can show up on Read attempt or Read&Write attempt, and there

are two categories of protected files – General and Personal.

This features can be accessed in Settings>Security tab.

Let’s explain how to use it on an example. We have four folders. Two of them are

set to General, the other two to Personal.

76 SpyShelter Firewall

© 2017 Datpol

If User tries to open the .txt file from the General folder, an alert window will

appear saying that Notepad.exe (or any other application assigned to open .txt

files) is trying to get Access to Read this file. If user allows this action, the Notepad

application will immediately gain access to all files which are placed inside General

category on Protected Files list.

If user attempts to run the same file for example with Open Office, the alert will

show up again because it is a process based solution.

After creating a rule for Notepad.exe which allows executing files from “General”

category, an attempt to execute a .txt file from a folder from “Personal” category

will result in another Alert window.

77SpyShelter Firewall

© 2017 Datpol

You can also create a folder with Read&Write access with General category, and

then specify files inside this folder with Personal category.

The files from Personal category will prompt another alert requesting additional

permissions, even if user selected “Remember my choice” option for the Read/

Write action for any file under General category in that folder.

It is also possible to export and import the list of protected files and folders by

using the Export and Import buttons at the top of the window.

78 SpyShelter Firewall

© 2017 Datpol

1.2.13 User Defined Protected Registry Keys

This feature is for advanced users only.

With this feature you can define your own list of registry keys which will be

protected against unauthorized access to delete or modify them. If an application

attempts to delete or modify the defined registry keys, SpyShelter will stop the

action and show up alert window with all details of the action. By default,

SpyShelter protects crucial registry keys in your system, and with this feature, you

can further extend this protection by adding your own defined critical registry keys.

This feature can be accessed in Settings>Security tab.

79SpyShelter Firewall

© 2017 Datpol

Allows to add new entry

Allows to edit existing entry (alternatively you can click twice on the entry to

edit it)

Removes the entry

Imports the list from a .txt file

Exports the list to a .txt file

Upon clicking on the Add button, new window shows up. You can enter the KeyPath

with Value or KeyPath alone. Wildcards are supported, for example thanks to the

usage of *, on the screenshot below, all subsequent registry entries located in

HKEY_LOCAL_MACHINE\SOFTWARE\ will be monitored by SpyShelter.

80 SpyShelter Firewall

© 2017 Datpol

Examples:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

HKEY_LOCAL_MACHINE\*\CurrentVersion\Run

HKCU\*\Microsoft\Windows\CurrentVersion\Run

HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\\UserInit

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.exe

Existing entries can be edited and removed by selecting them and clicking on the

edit/remove buttons.

When an application tries try to edit or delete one of the protected registry keys,

SpyShelter stops the action before it is finished and allows the user to decide

whether the action should be allowed or denied.

If "Remember my choice" field in the alert window is active, then the given

application will not raise any further alerts when it modifies the rules.

81SpyShelter Firewall

© 2017 Datpol

1.2.14 Tips

Tips Here is a list of useful tips for enhanced protection: - Do not allow programs to run if their behavior is suspicious. When you are notsure about the program, it is recommended that you first block it. If it doesoperate and your system remains stable, then you can remove this applicationfrom the black/white list and allow it to operate in your system. - Do not stop the SpyShelter program, when it is blocking a suspicious behaviour.Once the general protection is disabled, malicious software can install hooks,which cannot be blocked, even if you enable the protection later on (systemrestart may be required in order to restore full protection) - Do not trust all signed modules and check the signer's name to see what type of

software this company produces.

2 SpyShelter Firewall End User License Agreement

SPYSHELTER END USER LICENSE AGREEMENT (EULA)

LEGAL NOTICE: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT BEFORE

82 SpyShelter Firewall

© 2017 Datpol

YOU INSTALL START USING THE SOFTWARE.

THIS END USER LICENSE AGREEMENT (EULA) IS A LEGAL CONTRACT BETWEEN

THE AUTHORS OF SPYSHELTER AND YOU (END-USER). YOU AGREE TO BE BOUND

AND ARE AUTOMATICALLY THUS BOUND, BY THE TERMS OF THIS EULA AS SOON

AS YOU INSTALL THIS PROGRAM.

IF YOU DO NOT AGREE TO ANY OF THE TERMS CONTAINED IN THIS DOCUMENT,

PLEASE DO NOT INSTALL THE SOFTWARE AND DO NOT CLICK ON THE BUTTON

THAT INDICATES YOUR DESIRE TO BE BOUND BY THE LEGAL TERMS OF THIS

CONTRACT.

1. DEFINITIONS

1.1. "SOFTWARE", "PROGRAM", "PRODUCT", "SPYSHELTER" REFERS TO

SPYSHELTER PREMIUM AND SPYSHELTER FIREWALL SOFTWARE.

1.2. "USER", "END-USER", "YOU", MEANS A PERSON/ORGANIZATION WHO

INSTALLS AND/OR USES OUR SOFTWARE.

1.3. "COMPUTER", "PC" MEANS A DEVICE LIKE PERSONAL COMPUTER, LAPTOP OR

A WORKSTATION WHICH CAN BE USED TO RUN OUR SOFTWARE.

1.4. "OWNER", "PRODUCER", "DEVELOPER" MEANS DATPOL, JANUSZ

SIEMIENOWICZ - A COMPANY LOCATED IN OLKUSZ, POLAND, DEVELOPER OF

SPYSHELTER.

2. TRIAL VERSION AND ACTIVATING SOFTWARE

SPYSHELTER FIREWALL AND SPYSHELTER PREMIUM PROGRAMS ARE DISTRIBUTED

AS TRIAL VERSIONS. ALL FEATURES ARE UNLOCKED FOR 14 DAYS FROM THE

MOMENT OF INSTALLATION. TO USE SPYSHELTER BEYOND TRIAL PERIOD, AND

THUS TURN TRIAL VERSION INTO A FULL VERSION, A VALID LICENSE KEY HAS TO

BE USED TO ACTIVATE THE SOFTWARE.

SPYSHELTER FREE ANTI-KEYLOGGER IS A FREE VERSION OF THE PROGRAM.

DEVELOPER GRANTS A NON-EXCLUSIVE LICENSE TO USE THE SPYSHELTER FREE

ANTI-KEYLOGGER FOR 1 YEAR SINCE THE DATE OF RELEASE. THIS SOFTWARE

CAN BE USED ON BOTH HOME COMPUTERS AS WELL AS BUSINESS OR

INSTITUTIONAL DEVICES.

3. LICENSING

LICENSES CAN BE ACQUIRED FROM DEVELOPER'S WEBSITE AT https://www.

spyshelter.com/purchase/ OR FROM AUTHORIZED SPYSHELTER RESELLER.

SPYSHELTER LICENSE KEY IS BOUND TO LICENSEE'S NAME (PERSON'S FULL NAME

OR COMPANY NAME) AND ALLOWS TO USE SPYSHELTER ON THE AMOUNT OF

DEVICES THAT IS DETERMINED BY LICENSE TYPE AND QUANTITY.

ONE-YEAR LICENSE SHALL FUNCTION WITHIN THE SAME PERIOD AND SHALL

83SpyShelter Firewall End User License Agreement

© 2017 Datpol

AUTOMATICALLY STOP FUNCTIONING AFTER THIS TIME(365 DAYS FROM THE

MOMENT THE LICENSE KEY WAS GENERATED). A LIFETIME LICENSE WHICH IS

VALID FOR AN INDEFINITE PERIOD OF TIME MAY ALSO BE PURCHASED.

SPYSHELTER PROGRAM CAN BE USED BY ANY PERSON WHO OPERATES A

LICENSEE'S COMPUTER WITH ACTIVE SPYSHELTER LICENSE.

SPYSHELTER DEVELOPER GRANTS YOU THE FOLLOWING RIGHTS PROVIDED THAT

YOU COMPLY WITH ALL TERMS AND CONDITIONS OF THIS EULA. YOU ARE

ALLOWED TO:

A. USE ONE COPY OF THE SPECIFIC VERSION OF THE SOFTWARE AND ITS

ACCOMPANYING DOCUMENTS THAT YOU PURCHASED AND ENJOY THIS RIGHT AS

A NONTRANSFERABLE AND EXCLUSIVE RIGHT. IF YOU PURCHASED THIS PRODUCT

AS PART OF A SET OF SOFTWARE, YOU ARE ALSO BOUND BY THE TERMS OF THE

LICENSES FOR THOSE OTHER PRODUCTS IN THE SET, IF SO INDICATED IN THEIR

RESPECTIVE EULA. THIS SOFTWARE, UNLESS YOUR LICENSE INDICATES

OTHERWISE, MAY NOT BE USED ON MORE THAN ONE DEVICE.

C. INSTALL THIS SOFTWARE TO YOUR COMPUTER OR TO ANY OTHER COMPATIBLE

DEVICE FOR WHICH THIS PRODUCT HAS BEEN CREATED.

D. TRANSFER THE LICENSE TO OTHER COMPUTER(S) BY UNINSTALLING

SPYSHELTER ON THE COMPUTER(S) WHICH USE SPYSHELTER, AND THEN USING

THE SAME LICENSE KEY TO ACTIVATE SPYSHELTER ON NEW COMPUTER(S).

E. STORE YOUR LICENSE CODE IN A SAFE PLACE AND ONLY FOR THE PERSONAL

AND LEGAL PURPOSE OF CREATING A BACK-UP. YOU ARE RESPONSIBLE FOR

ENSURING THAT YOUR LICENSE CODE WILL NOT BE COPIED OR REPRODUCED

FOR ANY OTHER PURPOSE AND BY ANY OTHER PERSON.

F. ASK FOR A FULL REFUND UP TO 14 DAYS AFTER PLACING INITIAL ORDER.

AFTER THIS PERIOD, MONEY WILL NOT BE REFUNDED.

PURSUANT TO YOUR LICENSE, YOU HAVE THE FOLLOWING ADDITIONAL DUTIES:

A. UNINSTALL THE SOFTWARE SHOULD YOU DECIDE TO DISPOSE OF THE DEVICE

THAT CONTAINS THE SOFTWARE IN ORDER TO PREVENT UNAUTHORIZED

COPYING, DISTRIBUTION, REPRODUCTION, AND OTHER RELATED ACTS.

B. YOU MUST NOT TRANSFORM OR ALTER ANY PART OF THIS SOFTWARE [E.G.

TRANSFORM FROM SOURCE TO CODE, REVERSE ENGINEERING, PULLING UP,

MAKING IT READABLE IN DIFFERENT FORMS].

C. YOUR LICENSE TO THIS SOFTWARE DOES NOT, IN ANY WAY, ALLOW YOU TO

CREATE DERIVATIVE WORKS FROM THIS SOFTWARE. NEITHER ARE YOU

AUTHORIZED TO ALLOW A THIRD PARTY TO MAKE COPIES OF THE PRODUCT.

ACTIVITIES RELATED TO THIS PURPOSE SUCH AS CORRECTION OF MISTAKES,

OTHER TYPES OF MODIFICATION, ADAPTATION AND TRANSLATION ARE ALSO NOT

ALLOWED UNDER THIS AGREEMENT.

84 SpyShelter Firewall

© 2017 Datpol

D. IT IS PROHIBITED TO LEND, LEASE OR TRANSFER YOUR LICENSE RIGHTS TO

ANY THIRD PARTY OR THE GRANTING OF A LICENSE TO SUCH THIRD PARTY. IF

LICENSE CODE LEAKS INTO THE INTERNET, OR WILL BE USED OR MORE PC'S

THAN IT IS ALLOWED, LICENSE KEY WILL BE BLOCKED WITHOUT WARNING.

DEVELOPER RESERVES THE RIGHT TO DENY REQUESTS OF CHANGING

LICENSEE'S NAME.

E. SPYSHELTER REQUIRES ITS USERS TO INSTALL THE SOFTWARE’S LATEST

VERSION AND THE CORRESPONDING LATEST MAINTENANCE PACK THEREOF.

YOU, HOWEVER, MUST NOTE THAT IF YOU PURCHASED THE PRODUCT FROM A

VENDOR OTHER THAN SPYSHELTER, THE LATTER IS AND SHALL NOT BE LIABLE

FOR WARRANTIES AND GUARANTEES MADE BY THAT VENDOR IN RELATION TO

THE PRODUCT, UNLESS A SPECIFIC AGREEMENT ON THESE MATTERS HAVE BEEN

MADE BETWEEN THIS VENDOR AND SPYSHELTER.

USERS WHO PURCHASED THE SOFTWARE FROM VENDORS OTHER THAN DATPOL

AND DO NOT WISH TO BE BOUND BY THIS EULA AND FALL UNDER THE

CONDITIONS/CLASSIFICATIONS, PLEASE RETURN THE PRODUCT TO YOUR

VENDOR, WITH ITS CD/USB COVER INTACT AND UNALTERED IN ANY MANNER.

FAILURE TO PRESERVE THE PRODUCT AND ITS COVER IN ITS ORIGINAL STATE

WILL RESULT TO YOU BEING CONTINUOUSLY BOUND BY THE TERMS OF THIS

EULA.

4. SUPPORT

SPYSHELTER AGREES TO PROVIDE TECHNICAL SUPPORT AND FREE UPDATES FOR

AS LONG AS IT REMAINS IN LEGAL EXISTENCE AND WITHIN THE DURATION OF

THE LICENSES THAT YOU PURCHASED.

USE SUPPORT TICKET SYSTEM LOCATED AT https://www.spyshelter.com/helpdesk/

IN ORDER TO GET PRODUCT SUPPORT. SUPPORT REQUESTS ARE HANDLED IN

ENGLISH LANGUAGE ONLY. A TICKET IN A LANGUAGE DIFFERENT THAN ENGLISH

WILL BE IGNORED.

SUPPORT SERVICES INCLUDE SUPPORT VIA SUPPORT TICKET SYSTEM OF THE

DEVELOPER. IN ORDER TO GET TECHNICAL SUPPORT, YOU ARE REQUIRED TO

HAVE THE LATEST VERSION OF THE SOFTWARE (INCLUDING ITS MAINTENANCE

PACK).

SPYSHELTER SUPPORT WILL REPLY TO MESSAGE IN 72 HOURS FROM THE MOMENT

OF CREATING A SUPPORT TICKET. SPYSHELTERS RESERVES THE RIGHT TO

EXTEND THE TIME TO REPLY IN SPECIAL CASES. PRODUCER HOLDS NO

RESPONSIBILITY FOR A TICKET ANSWER THAT IS NOT DELIVERED TO THE USER

VIA E-MAIL.

PRODUCER WILL NOT REPLY TO MESSAGES THAT DO NOT CONCERN SPYSHELTER

PRODUCTS.

PRODUCER CAN DENY PROVIDING DETAILED INFORMATION ABOUT PROGRAM IN

85SpyShelter Firewall End User License Agreement

© 2017 Datpol

ORDER TO PRESERVE THE CONDIFENTIALITY OF COMMERCIALLY SENSITIVE DATA

AND INFORMATION.

DATPOL DOES NOT GUARANTEE TECH SUPPORT FOR SPYSHELTER FREE USERS.

5. PRIVACY

DEVELOPER COLLECTS PERSONAL INFORMATION OF LICENSED USERS IN ORDER

TO KEEP TRACK OF SALES RECORDS, AND PROVIDES NECESSARY SERVICES LIKE

RESENDING LOST LICENSE KEY. DATPOL DOES NOT COLLECT NOR STORE

TRANSACTION DETAILS SUCH AS CREDIT CARD NUMBER. TRANSACTIONAL

INFORMATION ARE GATHERED AND STORED BY Share-It (Digital River GmbH),

DEVELOPER'S PAYMENT PROCESSOR WHO RECORDS AND STORES PAYMENT

INFORMATION. YOU CAN VIEW DIGITAL RIVER GMBH PRIVACY POLICY AT http://

www.mycommerce.com/privacy-policy/

WE ARE COLLECTING MINIMUM DATA NECESSARY FOR SOFTWARE ACTIVATION

PROCESS AND CHECKING LICENSE VALIDITY.

IF USER INSTALLS SPYSHELTER SOFTWARE AND ACTIVATES THE LICENSE ONLINE

VIA SPYSHELTER.COM LICENSE SERVER, THE FOLLOWING INFORMATION WILL BE

SENT TO THE LICENSE SERVER: DATE AND TIME OF ATTEMPTED LICENSE

REGISTRATION, IP ADDRESS, COMPUTED HARDWARE ID, LICENSE SERIAL

NUMBER. NO PERSONAL IDENTIFICATION INFORMATION WILL BE SENT. DATA IS

COLLECTED IN REAL TIME AT THE MOMENT WHEN USER ATTEMPTS TO ACTIVATE

THE LICENSE ONLINE, AND PERIODICALLY POST-ACTIVATION, WHILE

SPYSHELTER IS RUNNING IN ORDER TO CHECK LICENSE VALIDITY. LOGS ON

SERVER ARE STORED FOR MAXIMUM 365 DAYS.

SPYSHELTER PRIVACY POLICY IS AVAILABLE AT: https://www.spyshelter.com/

privacy-policy/

6. PROPERTY RIGHTS

THIS SOFTWARE IS PROTECTED BY INTELLECTUAL PROPERTY LAWS. SPYSHELTER

CREATOR THUS OWNS ALL RIGHTS, PROPERTIES, AND OTHER INTERESTS OVER

THIS SOFTWARE. ACCORDING TO LAW, SPYSHELTER OWNS THE COPYRIGHTS,

PATENTS, TRADEMARKS, AND OTHER RELATED INTELLECTUAL PROPERTY RIGHTS

OF THIS PRODUCT AND THE USER’S UTILIZATION AND INSTALLATION OF THIS

PRODUCT DOES NOT, IN ANY WAY, TRANSFER THE RIGHTS JUST MENTIONED TO

THE USER. ONLY THOSE RIGHTS EXTENDED IN THIS EULA ARE TRANSFERRED TO

THE USER.

-YOU MAY NOT USE THIS PROGRAM IN ACTIONS, WHICH INFRINGE ANY LAW OF

YOUR COUNTRY OR INTERNATIONAL LAWS.

-YOU MAY NOT USE THIS PROGRAM IN ACTIONS, WHICH INFRINGE THE RIGHTS

OF ANY PERSON OR ENTITY.

-YOU MAY NOT DISASSEMBLE AND REVERSE ENGINEER ANY PART OF THIS

86 SpyShelter Firewall

© 2017 Datpol

PROGRAM

-YOU MAY NOT RENT, LEASE OR SELL THIS PROGRAM.

7. CONFIDENTIALITY

THIS SOFTWARE, ITS MAINTENANCE PACKS, THE SPECIAL DESIGN AND

STRUCTURE OF THE INDIVIDUAL PROGRAMS, THE LICENSE KEY, AND THE

RELATED DOCUMENTS ARE COVERED BY THIS CONFIDENTIALITY CLAUSE.

WITHOUT THE PRIOR CONSENT OF SPYSHELTER, YOU ARE UNAUTHORIZED TO

DISCLOSE OR DISPOSE ANY CONFIDENTIAL INFORMATION TO A THIRD PATY.

YOU ARE REQUIRED TO USE REASONABLE SECURITY MEASURES TO PROTECT

CONFIDENTIAL INFORMATION RECEIVED BY VIRTUE OF YOUR PURCHASE OF THIS

PRODUCT.

8. WARRANTY

NO WARRANTY, AND LIMITED REPLACEMENT: THE SOFTWARE IS PROVIDED "AS

IS" WITH NO WARRANTIES, EXPRESS OR IMPLIED. SPECIFICALLY DISCLAIMS ANY

AND ALL WARRANTIES,ANY IMPLIED WARRANTIES OF MERCHANTABILITY,

FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT OF INTELLECTUAL

PROPERTY RIGHTS, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY

PROPOSAL, SPECIFICATION, OR SAMPLE. IF THE MEDIA ON WHICH THE

SOFTWARE IS DISTRIBUTED ARE FOUND TO BE DEFECTIVE IN MATERIAL OR

WORKMANSHIP UNDER NORMAL USE FOR A PERIOD OF NINETY (90) DAYS FROM

THE DATE OF RECEIPT, DEVELOPER'S ENTIRE LIABILITY AND YOUR EXCLUSIVE

REMEDY SHALL BE THE REPLACEMENT OF THE MEDIA BY AUTHORIZED RESELLER

FROM WHOM YOU BOUGHT THE PRODUCT. THIS OFFER IS VOID IF THE MEDIA

DEFECT RESULTS FROM ACCIDENT, ABUSE, OR MISAPPLICATION.

9. LIMITATION OF LIABILITY.

IN NO EVENT SHALL SPYSHELTER DEVELOPER AND DISTRIBUTORS/PARTNERS BE

RESPONSIBLE FOR ANY INDIRECT, CONSEQUENTIAL OR SPECIAL DAMAGES OR

LOST PROFITS EVEN IF SPYSHELTER HAS BEEN ADVISED OF THE POSSIBILITY OF

SUCH DAMAGES, AND/OR FOR ANY CLAIM FOR COMPENSATION OR DAMAGE BY

ANY THIRD PARTY TO USER. LIABILITY ON THE PART OF SPYSHELTER AND ITS

AUTHORIZED REPRESENTATIONS/DEALERS SHALL ALSO NOT EXSIT IN CASE

THERE IS: LOSS OF INCOME OR PROFITS, LOSS OF SAVINGS, LOSS OF

OPPORTUNITY, LOSS OF HONOR, LOSS, DAMAGE OR HARM OF SENSITIVE DATA.

DISPUTES ARISING FROM THIS AGREEMENT SHALL BE RESOLVED IN THE PROPER

COURTS OF POLAND. THIS AGREEMENT IS VALID AND BINDING BETWEEN

SPYSHELTER AND THE USER. NO TERMS AND PROVISIONS OUTSIDE OF THIS

AGREEMENT SHALL BE VALID AND BINDING BETWEEN THESE PARTIES.

___________________________________

SpyShelter uses Crypto++ code for SHA256 hash calculation.

It is licensed under the Boost Software License 1.0

87SpyShelter Firewall End User License Agreement

© 2017 Datpol

You can read more about it at:

https://www.cryptopp.com/License.txt

___________________________________

DATPOL

K.K. WIELKIEGO 29

OLKUSZ, POLAND

REGON: 120012823

TAX VAT ID PL637-192-90-41

Contact: https://www.spyshelter.com/about-us/

SpyShelter Firewall88

© 2017 Datpol

Index

- A -apps 42

- G -GettingStarted 3

- H -HowToBuy 19, 65

- W -Welcome 3