background image

35

6.  Glossary

6.1  Types of infiltrations

An Infiltration is a piece of malicious software trying to enter and/or 
damage a user’s computer.

6.1.1 

Viruses

A computer virus is an infiltration which corrupts existing files on your 
computer. Viruses are named as such after biological viruses, as they 

use similar techniques to spread from one computer to another.

Computer viruses attack mainly executable files and documents. To 

replicate, a virus attaches its “body“ to the end of a target file. In short, 

this is how a computer virus works: after execution of the infected 
file, the virus activates itself (before the original application) and 

performs its predefined task. Only after that is the original application 

allowed to run. A virus cannot infect a computer unless a user (either 
accidentally or deliberately) runs or opens the malicious program by 

him/herself.

Computer viruses can range in activity and severity. Some of them 

are extremely dangerous because of their ability to purposely delete 

files from a hard drive. On the other hand, some viruses cause no real 
damage – they only serve to annoy the user and demonstrate the 

technical skills of their authors.

It is important to note that viruses are (when compared to trojans 

or spyware) gradually becoming more of a rarity, since they are not 

commercially enticing for authors of malicious software. Also, the 
term “virus” is often incorrectly used to cover all types of infiltrations. 
At present, this is gradually being overcome and the new, more 
accurate term “malware” (malicious software) is used.

If your computer is infected with a virus, it is necessary to restore 
infected files to their original state – i.e. to clean them by using an 
antivirus program.

Examples of viruses are:

 OneHalf, Tenga, and Yankee Doodle.

6.1.2 

Worms

A computer worm is a program containing malicious code that 
attacks host computers and spreads via a network. The basic 
difference between a virus and a worm is that worms have the ability 
to replicate and travel by themselves. They are not dependent on host 
files (or boot sectors).

Worms proliferate by means of email or network packets. In this 
regard, worms can be categorized two ways:

▪ 

Email 

 distributing themselves to email addresses found in 

a user’s contact list and

▪ 

Network

 – 

exploiting security vulnerabilities in various 

applications.

Worms are therefore much more viable than computer viruses. Due 
to the wide availability of the Internet, they can spread across the 
globe within hours of their release – in some cases, even in minutes. 
This ability to replicate independently and rapidly makes them more 
dangerous than other types of malware, such as viruses.

A worm activated in a system can cause a number of inconveniences: 
It can delete files, degrade system performance, or even deactivate 
some programs. The nature of a computer worm qualifies it as a 
“means of transport“ for other types of infiltrations.

If your computer is infected with a computer worm, we recommend 
that you delete infected files, because they likely contain malicious 

code.

Examples of well‑known worms are:

 Lovsan/Blaster, Stration/

Warezov, Bagle, and Netsky.

6.1.3 

Trojan horses

Historically, computer trojan horses have been defined as a class of 
infiltrations which attempt to present themselves as useful programs, 

thus tricking users into letting them run. But it is important to note 
that this was true for trojan horses in the past–today, there is no 

longer a need for them to disguise themselves. Their sole purpose 

is to infiltrate as easily as possible and accomplish their malicious 
goals. “Trojan horse” has become a very general term describing any 

infiltration not falling under any specific class of infiltration.

Since this is a very broad category, it is often divided into many 

subcategories. The most widely known are:

▪ 

downloader – a malicious program with the ability to download 

other infiltrations from the Internet.

▪ 

dropper – a type of trojan horse designed to drop other types 

of malware onto compromised computers.

▪ 

backdoor – an application which communicates with remote 

attackers, allowing them to gain access to a system and to take 
control of it.

▪ 

keylogger – (keystroke logger) – a program which records each 
keystroke that a user types and sends the information to remote 

attackers.

▪ 

dialer – dialers are programs designed to connect to premium‑rate 

numbers. It is almost impossible for a user to notice that a new 
connection was created. Dialers can only cause damage to users 
with dial‑up modems, which are no longer regularly used.

Trojan horses usually take the form of executable files with the 
extension .exe. If a file on your computer is detected as a trojan horse, 
it is advisable to delete it, since it most likely contains malicious code.

Examples of well‑known trojans are:

 

NetBus, Trojandownloader.

Small.ZL, Slapper

6.1.4 

Rootkits

Rootkits are malicious programs that grant Internet attackers 
unlimited access to a system, while concealing their presence. 
Rootkits, after accessing a system (usually exploiting a system 
vulnerability), use functions in the operating system to avoid 
detection by antivirus software: they conceal processes, files and 
Windows registry data. For this reason, it is almost impossible to 
detect them using ordinary testing techniques.

When it comes to rootkit prevention, remember that there are two 
levels of detection:

1.  When they try to access a system. They are still not present, 

and are therefore inactive. Most antivirus systems are able to 
eliminate rootkits at this level (assuming that they actually detect 
such files as being infected).

2.  When they are hidden from the usual testing. Users of the ESET 

antivirus system have the advantage of Anti‑Stealth technology, 
which is also able to detect and eliminate active rootkits.

6.1.5 

Adware

Adware is a short for advertising‑supported software. Programs 
displaying advertising material fall under this category. Adware 
applications often automatically open a new pop‑up window 

containing advertisements in an Internet browser, or change the 
browser’s home page. Adware is often bundled with freeware 
programs, allowing their creators to cover development costs of their 

(usually useful) applications.

Adware itself is not dangerous – users will only be bothered with 

advertisements. Its danger lies in the fact that adware may also 

Содержание SMART SECURITY

Страница 1: ...Integrated components ESET NOD32 Antivirus ESET NOD32 Antispyware ESET Personal Firewall ESET Antispam New generation of NOD32 technology User Guide ...

Страница 2: ...body 14 4 1 2 3 Removing infiltrations 14 4 1 3 Web access protection 14 4 1 3 1 HTTP 14 4 1 3 1 1 Blocked excluded addresses 15 4 1 3 1 2 Web browsers 15 4 1 4 Computer scan 15 4 1 4 1 Type of scan 16 4 1 4 1 1 Standard scan 16 4 1 4 1 2 Custom scan 16 4 1 4 2 Scan targets 16 4 1 4 3 Scan profiles 16 4 1 5 ThreatSense engine parameters setup 16 4 1 5 1 Objects setup 17 4 1 5 2 Options 17 4 1 5 3 ...

Страница 3: ...28 4 8 1 Alerts and notifications 29 4 9 ThreatSense Net 29 4 9 1 Suspicious files 30 4 9 2 Statistics 30 4 9 3 Submission 31 4 10 Remote administration 31 4 11 License 32 5 Advanced user 33 5 1 Proxy server setup 33 5 2 Export import settings 33 5 2 1 Export settings 33 5 2 2 Import settings 33 5 3 Command Line 33 6 Glossary 35 6 1 Types of infiltrations 35 6 1 1 Viruses 35 6 1 2 Worms 35 6 1 3 T...

Страница 4: ...rk communication scanning on the Data Link Layer enables ESET Personal firewall to overcome a variety of attacks that would otherwise be undetectable IPv6 support ESET Personal firewall displays IPv6 addresses and allows users to create rules for them Executable file monitoring Monitoring changes in executable files in order to overcome infection It is possible to allow file modification of signed...

Страница 5: ...rs later option Authentication data can be inserted at any time later on directly from the program The next step in the installation is configuration of the ThreatSense Net Early Warning System The ThreatSense Net Early Warning System helps to ensure that ESET is immediately and continuously informed about new infiltrations in order to quickly protect its customers The system allows for submission...

Страница 6: ...e a proxy server it must be correctly configured in order for virus signature updates to work properly If you don t know whether you use a proxy server to connect to the Internet leave the default setting I am unsure if my Internet connection uses a proxy server Use the same settings as Internet Explorer and click Next If you do not use a proxy server select the corresponding option To configure y...

Страница 7: ...rd you wish to protect the program with Retype the password to confirm The steps Configuration of the ThreatSense Net Early Warning System and Detection of potentially unwanted applications are the same as for a Typical installation and are not shown here see page 5 The last step in Custom mode is to select the ESET Personal firewall filtering mode Three modes are available Automatic Interactive P...

Страница 8: ...tically updated This is only possible if the correct user name and password are entered in the update setup If you did not enter your user name and password during the installation you can do so now In the main program window click Update and then click User name and Password Setup Enter the data you received with your product license into the License details window 2 5 On demand computer scan Aft...

Страница 9: ...T Knowledgebase ESET s web site and access a Customer Care support request The ESET Smart Security user interface allows users to toggle Standard and Advanced modes To toggle between modes see the Display link located in the bottom left corner of the main ESET Smart Security window Click this button to select the desired display mode The Standard mode provides access to features required for commo...

Страница 10: ... time of purchase should be entered If the User name and Password were entered during the installation of ESET Smart Security you will not be prompted for them at this point The Advanced Setup window to access press F5 contains other detailed update options The Update server drop down menu should be set to Choose automatically To configure advanced update options such as the update mode proxy serv...

Страница 11: ...a If this information is not available you can attempt to automatically detect proxy server settings for ESET Smart Security by clicking the Detect proxy server button NOTE Proxy server options for various update profiles may differ If this is the case configure the proxy server in the advanced update setup 3 5 Settings protection ESET Smart Security Settings can be very important from the perspec...

Страница 12: ...y created files The probability of infection in newly created files is comparatively higher than in existing files This is why the program checks these files with additional scanning parameters Along with common signature based scanning methods advanced heuristics are used which greatly improves detection rates In addition to newly created files scanning is also performed on self extracting files ...

Страница 13: ... are enabled at the same time they may conflict with each other We recommend that you uninstall any other antivirus programs on your system Real time protection does not start If real time protection is not initiated at system startup and the Automatic real time file system protection startup option is enabled it may be due to conflicts with other programs If this is the case please consult ESET s...

Страница 14: ... protection Email protection The program can Append tag messages to received and read mail as well as Append tag messages to sent mail Users also have the ability to decide whether tag messages should be appended to all email to infected email only or not at all ESET Smart Security also allows the user to append messages to the original subject of infected messages To enable appending to the subje...

Страница 15: ...application is monitored regardless of the port numbers involved in the communication The Web browsers feature complements the HTTP checking feature as HTTP checking only takes place on predefined ports However many Internet services utilize dynamically changing or unknown port numbers To account for this the Web browser feature can establish control of port communications regardless of the connec...

Страница 16: ...s The Scan targets drop down menu allows you to select files folders and devices disks to be scanned for viruses Using the quick scan targets menu option you can select the following targets Local drives controls all system hard drives Removable media diskettes USB storage devices CD DVD Network drives all mapped drives A scan target can also be more precisely specified by entering the path to the...

Страница 17: ...rchives Scans files which are contained in self extracting archive files but typically presented with a exe extension Runtime packers runtime packers unlike standard archive types decompress in memory in addition to standard static packers UPX yoda ASPack FGS etc 4 1 5 2 Options In the Options section the user can select the methods to be used when scanning the system for infiltrations The followi...

Страница 18: ...f files with no extension select the Scan extensionless files option Excluding files from scanning has its purpose if the scanning of certain file types prevents the program using the extensions to run properly For example it may be advisable to exclude the edb eml and tmp extensions when using the MS Exchange server 4 1 6 An infiltration is detected Infiltrations can reach the system from various...

Страница 19: ... gives the option of allowing or denying the communication and the decision to allow or deny can be remembered as a new rule for the Personal firewall If the user chooses to create a new rule at this time all future connections of this type will be allowed or blocked according to the rule Policy based mode blocks all connections which are not defined by a specific rule that allows them This mode a...

Страница 20: ...on about the remote port port range It also allows the user to define a list of remote IP addresses or zones for a given rule A good example of adding a new rule is allowing your Internet browser to access the network The following must be provided in this case On the General tab enable outgoing communication via the TCP UDP protocol Add the process representing your browser application for Intern...

Страница 21: ...t ESET Personal firewall log from the Log drop down menu The log files are an invaluable tool for detecting errors and revealing intrusions into the system and should be given appropriate attention ESET Personal firewall logs contain the following data Date and time of event Name of event Source and target network address Network communication protocol Rule applied or name of worm if identified Ap...

Страница 22: ...ssify selected messages as spam or click Spam from the ESET Smart Security Antispam toolbar located in your email client Reclassified messages are automatically moved to the SPAM folder but the sender email address is not added to blacklist Similarly messages can be classified as not spam If messages from the Junk E mail folder are classified as not spam they are moved to their original folder Mar...

Страница 23: ...vanced update setup click the Setup button Advanced update setup options include configuration of Update Mode HTTP Proxy LAN and Mirror 4 4 1 2 1 Update mode The Update mode tab contains options related to the program component update In the Program component update section three options are available Never update program components Always update program components Ask before downloading program c...

Страница 24: ...ng system authentication for each network connection is required by default In most cases a local system account doesn t have sufficient rights to access the Mirror folder the Mirror folder contains copies of update files If this is the case enter the user name and password in the update setup section or specify an existing account under which the program will enter the update server Mirror To con...

Страница 25: ...ion used by the HTTP server By default the Server port is set to the value 2221 The Authentication option defines the method of authentication used for accessing the update files The following options are available NONE Basic and NTLM Select Basic to use the base64 encoding with basic user name and password authentication The NTLM option provides encoding using a safe encoding method For authentic...

Страница 26: ...veryone a domain user name and password will still need to be entered in the update setup section ESET Smart Security reports an error connecting to the Mirror server communication on the port defined for accessing the HTTP version of the Mirror is blocked 4 4 2 How to create update tasks Updates can be triggered manually by clicking Update virus signature database in the information window displa...

Страница 27: ... is to safely store infected files Files should be quarantined if they cannot be cleaned if it is not safe or advisable to delete them or if they are being falsely detected by ESET Smart Security The user can choose to quarantine any file he or she wants to This is advisable if a file behaves suspiciously but is not detected by the antivirus scanner Quarantined files can be submitted for analysis ...

Страница 28: ...ed to the clipboard by selecting the entry and clicking the Copy button To select multiple entries the CTRL and SHIFT keys can be used 4 7 1 Log maintenance The Logging configuration of ESET Smart Security is accessible from the main program window Click Setup Enter entire advanced setup tree Tools Log files You can specify the following options for log files Delete records automatically Log entri...

Страница 29: ...d To close pop up windows automatically after a certain period of time select the option Close messageboxes automatically after sec If they are not closed manually by the user alert windows are automatically closed after the specified time period has expired Notifications on the desktop and balloon tips are informative only and do not require or offer user interaction They are displayed in the not...

Страница 30: ...this option is selected suspicious files are sent in the background If you wish to know which files have been sent for analysis and confirm the submission select the Ask before submitting option If you don t want any files to be submitted select Do not submit for analysis Note that not submitting files for analysis does not affect submission of statistical information to ESET Statistical informati...

Страница 31: ...mission of a suspicious file or a piece of statistical information an entry in the event log is created 4 10 Remote administration Remote administration is a powerful tool for maintaining security policy and for obtaining an overview of the overall security management within the network It is especially useful when applied to larger networks Remote Administration not only increases the security le...

Страница 32: ...nse manager is accessible from the Advanced Setup tree under Miscellaneous Licenses The license key is a text file containing information about the purchased product its owner number of licenses and the expiry date The license manager window allows the user to upload and view the content of a license key using the Add button the information contained is displayed in the manager To delete license f...

Страница 33: ...he user Proxy server settings can also be established within the Advanced update setup Update branch of the Advanced Setup tree This setting applies for the given update profile and is recommended for laptops as they often receive virus signature updates from different locations For more information about this setting see Section 4 4 Updating the system 5 2 Export import settings Export and import...

Страница 34: ...lder nesting LEVEL default 0 unlimited symlink follow symbolic links default no symlink skip symbolic links ext remove EXTENSIONS ext exclude EXTENSIONS exclude EXTENSIONS delimited by colon from scanning Methods adware scan for Adware Spyware Riskware no adware do not scan for Adware Spyware Riskware unsafe scan for potentially unsafe applications no unsafe do not scan for potentially unsafe appl...

Страница 35: ... of well known worms are Lovsan Blaster Stration Warezov Bagle and Netsky 6 1 3 Trojan horses Historically computer trojan horses have been defined as a class of infiltrations which attempt to present themselves as useful programs thus tricking users into letting them run But it is important to note that this was true for trojan horses in the past today there is no longer a need for them to disgui...

Страница 36: ...usually require consent for installation If they are present on your computer your system behaves differently compared to the state before their installation The most significant changes are new windows you haven t seen previously are opened activation and running of hidden processes increased usage of system resources changes in search results application communicates with remote servers 6 2 Type...

Страница 37: ...nce and danger to the user is increased by the fact that the costs of sending are next to zero and authors of spam have many tools and sources available to acquire new email addresses In addition the volume and variety of spam makes it very difficult to regulate The longer you use your email address the higher the possibility of it ending up in a spam engine database Some hints for prevention If p...

Страница 38: ... categories and learns for example that spam usually contains words rolex or viagra and legitimate messages are sent by family members or from addresses in the user s contact list Provided that a greater number of messages was processed the Bayesian filter is able to assign a certain spam index to each message and thus decide on whether it is spam or not The main advantage is its flexibility If a ...

Отзывы: