Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cybersecurity

    GreenBorder Pro 2.9

    Written by

    Neil J. Rubenking
    Published July 5, 2006
    Share
    Facebook
    Twitter
    Linkedin

      Editors note: When GreenBorder Pro becomes available on Monday, June 26, the first 10,000 people to download it will receive a free one-year subscription.
      GreenBorder Pro wont scour your computer and remove evil programs—thats not its job. But when its actively patrolling Microsoft Internet Explorers borders, any malware that tries to install itself or glom onto your personal information will fail. Period. The software insulates IE from the rest of your system by using virtual-machine techniques. What happens in GreenBorder stays in GreenBorder!

      Click here to read the full review of GreenBorder Pro 2.9.

      2

      Editors note: When GreenBorder Pro becomes available on Monday, June 26, the first 10,000 people to download it will receive a free one-year subscription.

      GreenBorder Pro wont scour your computer and remove evil programs—thats not its job. But when its actively patrolling Microsoft Internet Explorers borders, any malware that tries to install itself or glom onto your personal information will fail. Period. The software insulates IE from the rest of your system by using virtual-machine techniques. What happens in GreenBorder stays in GreenBorder!

      This isnt new technology; large companies have used GreenBorder Enterprise for years. This version brings the same level of protection to consumers and small businesses, but leaves out the centralized administration and other enterprise-level features. Where products such as Faronics Anti-Executable and ProcessGuard block all executables that havent been approved, GreenBorder lets them do whatever they want—but not permanently.

      The utilitys protection is specific to IE, though the company plans support for other browsers. When you launch IE, a green border around the window lets you know browsing is protected. Any program launched by IE or another protected program is likewise protected. Downloaded software, ActiveX controls, and other executable items may install within the protected browser—or may fail because of GreenBorders restrictions. Whether they install completely, partially, or not at all, the underlying system is unchanged. The GreenBorder environment captures all changes, and a “Clean and Reset GreenBorder” option wipes the slate clean. Downloaded program files are sequestered in a special My GreenBorder Files folder under My Documents; launching any file from this folder invokes protection even if the browser isnt running.

      GreenBorder also blocks protected programs from accessing your personal files. It specifically protects files in or below My Documents and Desktop. Web sites attempting to troll for personal data will fail, as will spyware programs that try to grab personal files. If you actively transmit a protected file, perhaps as a webmail attachment, the utility asks for confirmation. Thats about the only confirmation pop-up youll see; GreenBorder is very quiet compared with most security programs.

      The optional SafeFiles feature lets you download files to any location and still retain GreenBorders protection. You can also use a SafeFiles right-click menu to add or remove GreenBorder protection for any file. I cant see paying an extra $14.95 per year for SafeFiles, though. Even without it you can protect files by putting them into the My GreenBorder Files folder and remove protection by taking them out. And launching any file in IE confers GreenBorder protection. For example, with a Microsoft Word file called Sample.doc thats stored in the folder Test on the D: drive, youd simply type d:testsample.doc into the IE address bar and hit Enter.

      For even more extreme security—when shopping or banking, say—you can invoke the Privacy Zone, which causes GreenBorder to close and clean up all programs running under its protection. It then opens a single browser window with a yellow border, signifying youre in the Privacy Zone. When you finish your online actions and close the zone, GreenBorder wipes out all traces of the transaction.

      /zimages/1/28571.gifRead the full story on PCMag.com: GreenBorder Pro 2.9

      Neil J. Rubenking
      Neil J. Rubenking
      Neil Rubenking served as vice president and president of the San Francisco PC User Group for three years when the IBM PC was brand new. He was present at the formation of the Association of Shareware Professionals and served on its board of directors. In 1986, PC Magazine brought Neil on board to handle the influx of Turbo Pascal tips submitted by readers. By 1990, he had become PC Magazine's technical editor and a coast-to-coast telecommuter. His "User to User" column provided readers with tips and solutions on using DOS and Windows, while his technical columns clarified fine points in programming and operating systems. His utility articles—over forty in total—featured useful programs and programming examples in Pascal, Visual Basic, and Delphi. Mr. Rubenking has written seven books on DOS, Windows, and Pascal/Delphi programming, including PC Magazine DOS Batch File Lab Notes and the popular Delphi Programming for Dummies. In his current role as a PC Magazine Lead Analyst, he evaluates and reports on client-side operating systems and security solutions, such as firewalls, anti-virus, anti-spyware, anti-spam, and full security suites. He continues to answer readers' questions in the ongoing "Solutions" column and on PC Magazine's discussion forums.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.