: Continuously monitors the system to detect and block threats instantly.

: Searches deep hard drive areas and sub-folders to find hidden files.

: Permanently deletes sensitive files so they cannot be recovered.