Viruses and more
59
Adware is software that presents banner ads or in pop-up windows through a bar that
appears on a computer screen. These advertisements usually cannot be removed and are
consequently always visible. The connection data allow many conclusions on the usage
behavior and are problematic in terms of data security.
Backdoors
A backdoor can gain access to a computer by bypassing the computer access security
mechanisms.
A program that is being executed in the background generally enables the attacker
almost unlimited rights. User's personal data can be spied with the backdoor's help.. But
are mainly used to install further computer viruses or worms on the relevant system.
Boot viruses
The boot or master boot sector of hard disks is mainly infected by boot sector viruses.
They overwrite important information necessary for the system execution. One of the
awkward consequences: the computer system cannot be loaded any more…
Bot-Net
A bot-net is defined as a remote network of PCs (on the Internet) that is composed of
bots that communicate with each other. A bot-net can comprise a collection of cracked
machines running programs (usually referred to as worms, Trojans) under a common
command and control infrastructure. Bot-nets serve various purposes, including denial-
of-service attacks etc., usually without the affected PC user's knowledge. The main
potential of bot-nets is that the networks can achieve grow to thousands of computers
and their total bandwidth exceeds most conventional Internet accesses.
Exploit
An exploit (security gap) is a computer program or script that takes advantage of a bug,
glitch or vulnerability leading to privilege escalation or denial of service on a computer
system. One form of exploitation for example is an attack from the Internet with the
help of manipulated data packages. Programs can be infiltrated in order to obtain higher
access.
Hoaxes
For several years, Internet and other network users have received alerts about viruses
that are purportedly spread via email. These alerts are spread via email with the request
that they should be sent to the highest possible number of colleagues and to other users,
in order to warn everyone against the "danger".
Honeypot
A honeypot is a service (program or server) installed in a network. Its function is to
monitor a network and log attacks. This service is unknown to the legitimate user -
because of this reason he is never addressed. If an attacker examines a network for the
weak points and uses the services which are offered by a honeypot, it is logged and an
alert is triggered.
Summary of Contents for PREMIUM SECURITY SUITE
Page 1: ...Avira Premium Security Suite User Manual...
Page 45: ...Avira Premium Security Suite 40 Start job Stop job...
Page 46: ...41...