To stop any possible harm to the device and make sure the security of one's knowledge and privacy, our staff checks when a new installation file is uploaded to our servers or associated with a remote server and periodically reviews the file to verify or update its status. Dependant on this checking, we established the next protection concentrations