Patented Solution


 

Hacking attacks keep succeeding despite widespread use of antivirus. Now you can finally have the protection against hackers that antivirus doesn’t provide.

Industry leaders anticipated that effective protection against hackers could only be found in a security approach known as whitelisting. Traditional whitelisting effectively stopped hackers by restricting traffic to a predetermined list of sites. Unfortunately, traditional whitelisting was too cumbersome to administer and too restrictive on users — forcing the industry to implement the opposite approach (blacklisting) in antivirus.

Reliance on antivirus blacklisting gives hackers free reign over any computer they want. Genuine protection against hackers requires a solution that maintains the effectiveness of whitelisting while also being easy to administer and easy to use.

“Google security expert says antivirus apps don’t work. It’s time to switch to whitelisting instead.” — Network World

A world-renowned cryptographer has just discovered the final piece of the whitelisting puzzle — finally making the effectiveness of whitelisting available to all. Terra Privacy LLC has just unveiled the first cybersecurity solution that provides you the protection of whitelists without any of the traditional restrictions. Introducing Hacker Deterrent Pro.

Traditional whitelists required administrators to predetermine every acceptable site. Hacker Deterrent Pro starts off with zero entries in its whitelist — requiring no administration whatsoever.

Traditional whitelists were too restrictive on users. Hacker Deterrent Pro introduces a new form of browser whitelisting that’s 100% automatic — allowing you to freely surf the net and download any software you choose; while still being fully protected by a whitelisting paradigm.

How it Works

Every time you open your browser, your browsing whitelist starts afresh with zero entries. Then:

  1. Each webpage you enter into the browser is automatically inserted into a Transient Whitelist.
  2. All sites that each webpage pulls content from are automatically discovered and inserted into the Transient Whitelist.
  3. Each time you leave a webpage, the webpage and all its content sites are automatically removed from the Transient Whitelist.

Amazingly, Hacker Deterrent Pro dynamically generates this Transient Whitelist on-the-fly, in realtime, as you surf the net. At all times, only browser traffic needed for your open pages is allowed; while all other browser traffic remains blocked. In other words, all trojans pretending to be the browser remain blocked from the time you open the browser to the time you close it.

This ingenious approach effectively stops phishing, hacking, and tracking attacks that antivirus doesn’t even touch. Meanwhile, this unique whitelisting method doesn’t require even a single predetermined entry. You finally have the strength of whitelists without any of the traditional restrictions.

Non-Browser Trojans

Hacker Deterrent Pro also protects users against trojans that inject themselves into non-browser apps as well.

In general, non-browser apps solely need to talk to their makers. For example, Microsoft Word usually only needs to talk to its maker – Microsoft Corporation. As another example, Adobe Photoshop usually only needs to talk to its maker – Adobe Systems Inc. Therefore, if non-browser apps are solely whitelisted to talk their makers, trojans cannot hijack these apps to make secret connections to hackers’ command and control centers.

Consider Trojan T9000 which recently bypassed all the leading cybersecurity products. Trojan T9000 bypassed antivirus by injecting itself into Explorer.exe to use this app to secretly connect to a hacker’s server at IP address 198.55.120.143. However, if Explorer.exe is solely whitelisted to talk to its maker (Microsoft Corporation) then even this highly evasive trojan is blocked from using it to connect to all possible hacker IP addresses. That’s the Hacker Deterrent Pro difference.

100% whitelisting for all internet traffic

In summary, Hacker Deterrent Pro uses Transient Whitelisting to thwart browser-injected trojans, and it uses Maker-Based Whitelisting to block trojans that hijack other apps. Yet the product doesn’t stop there. Hacker Deterrent Pro also uses Triple-DNS Whitelisting to protect the operating system traffic as well.

Via three dynamic whitelisting methods working synergistically together, all internet traffic is protected in a 100% whitelisting framework. With Hacker Deterrent Pro’s unique dynamic whitelisting technology: Only traffic to whitelisted sites enters the internet.

When it comes to stopping hackers, nothing’s more effective than whitelists. Now users finally have a 100% whitelisting solution to protect their digital lives from the constant barrage of hacking attacks

 

Videos

 

Click to Read IDC Analysis

Hacker Deterrent Users Safe from CCleaner Attack

Over 2.3 million computers recently got infected when users downloaded copies of CCleaner from the official program site. Hackers replaced the authentic version of CCleaner with a malicious trojan. The trojan software secretly transmitted sensitive information to the hacker’s command center (IP Address: 216.126.225.148).

Most cybersecurity products allowed the data to be transmitted because it was being sent by a reputable program (CCleaner). Fortunately, Hacker Deterrent Pro users were 100% protected from this malicious connection to the hacker’s server. Read more.