AVG 9 Internet Security © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
209
This is a brief description of the most common examples of such objects:
·
Hidden files
- The hidden files are by default not visible in Windows, and some
viruses or other threats may try to avoid their detection by storing their files
with this attribute. If your AVG reports a hidden file which you suspect to be
malicious, you can move it to your
AVG Virus Vault
.
·
Cookies
- Cookies are plain-text files which are used by websites to store
user-specific information, which is later used for loading custom website
layout, pre-filling user name, etc.
·
Suspicious registry keys
- Some malware stores its information into Windows
registry, to ensure it is loaded on startup or to extend its effect on the
operating system.
11.7.5. Rootkits Tab
The
Rootkits
tab displays information on rootkits detected during scanning if you have
launched the
Anti-Rootkit scan
, or manually added the option of anti-rootkit scanning
into the
Scan of the Whole Computer
(
this option is switched off by default
).
A
rootkit
is a program designed to take fundamental control of a computer system,
without authorization by the system's owners and legitimate managers. Access to the
hardware is rarely required as a rootkit is intended to seize control of the operating