eSafe Enterprise and eSafe Desktop offers complete protection against an upgraded version of the back-door Trojan, SubSeven. Hackers responsible for creating the SubSeven vandal are catching on to traditional software development practices by releasing beta versions, bug tracks, and online automatic updates in the form of SubSeven 2.2.
"eSafe`s Sandbox II technology blocks any such vandal from infecting and taking over PCs," assures Brett Myroff, CEO of eSafe Technologies SA. He says SubSeven 2.2, along with variant Back Oriffice 2000, represents the latest evolution of remote control, espionage tools designed to compromise network security.
These vandals feature high-end software technologies such as plug-in modules to enhance performances and offer automated software updates. Myroff expects thousands of PCs to be contaminated, while users may be completely unaware that systems have been compromised or accessed by unauthorised parties.
Myroff describes SubSeven 2.2 as an advanced vandal. "It`s an aggressive Trojan with the capability to download multiple files from the victim`s PC. Usually it arrives as an e-mail attachment although it might be integrated with other innocent-looking programs such as screen savers, small games or greeting cards," he explains. "eSafe Desktop and Enterprise provide protection against any form of vandal entering systems through Internet, Web, e-mail or newsgroup messages."
The SubSeven 2.2 vandal has numerous capabilities such as taking over ICQ, retrieving dial-up passwords and numbers along with phone numbers and usernames. It is also known to conduct a port redirect, helping hackers attack other PCs, while victim`s personal information becomes easily available to hackers.
eSafe`s Sandbox technology provides an extra layer of protection against the SubSeven 2.2 vandal, as well as unknown vandals, by restricting access to designated system resources without relying on traditional signature tables for identification or removal of malicious code.
"If the Sandbox identifies potentially hostile activity, it verifies the use of system resources against a predefined list of allowed activities. Should the application not be permitted to engage in a particular activity, eSafe will quarantine the vandal and notify the user of the application`s actions," says Myroff. "This allows the user to take action before the vandal can damage vital system resources."
Apart from Sandbox II, eSafe products incorporate other proprietary technologies to protect against both known and unknown vandals, Trojans and viruses. "eSafe provides complete, multi-tier content security for corporate and home users," concludes Myroff.

