Internet Security and Privacy
66
McAfee Guard Dog
Java contains an internal security system that addresses security risks. ActiveX
uses a different model, based on certificate authentication. Certificates contain
information about who developed the ActiveX code. The idea here is that if
you know who developed the code, it is safe to run it. Both security schemes
offer a level of safety, but no one can yet promise that executable content is
entirely safe.
Nasty applets
One possible security threat is a malign Java or Active X program that attacks
your computer over the Web. A nasty applet might, for example, thwart Java
security by circumventing its security model, and destroy data on your hard
disk, or grab sensitive information from your hard drive. The latest browsers
have done a good job of fixing these issues. As long as you are using the latest
version of your browser you are protected. To date, there have been no
legitimate reports of hostile Java or ActiveX harming anyone. However, there
is no guarantee that an attack will not happen in the future.
Can I prevent programs from accessing the Internet?
You can use Guard Dog to specify the applications that are allowed to access
the Internet from your computer. Obviously, your default Internet browser is
one of these applications.
If the Guard Dog Gatekeeper is running in the background while you work on
the Internet, each time an application tries to access the Internet a dialog box
appears to ask if you want to allow this access once only, always, or never.
Computer viruses and the Web
A computer virus is a small computer program that automatically replicates
itself and spreads from PC to PC. Viruses may infect programs, your hard
drive, and even some document files that employ macros. Viruses do not
infect data files, but they can create problems that prevent you from accessing
your data. Viruses are not accidents—they are always created by computer
programmers.
PC viruses are similar to biological viruses in that they:
• Are spread from host to host—the “host,” in this instance, is your PC.
• Are very good at reproducing themselves.
• Can wreak havoc in an infected host system.
Содержание Guard Dog
Страница 1: ...McAfee Guard Dog User s Guide...
Страница 10: ...Table of Contents x McAfee Guard Dog Technical support 74 McAfee training 74...
Страница 22: ...Installing Guard Dog 12 McAfee Guard Dog...
Страница 36: ...Quick Tour of Guard Dog 26 McAfee Guard Dog...
Страница 44: ...Customizing Guard Dog 34 McAfee Guard Dog...
Страница 52: ...Privacy Features 42 McAfee Guard Dog...
Страница 62: ...Security Features 52 McAfee Guard Dog...
Страница 68: ...Using AntiVirus Features 58 McAfee Guard Dog...
Страница 82: ...Internet Security and Privacy 72 McAfee Guard Dog...