29.07.2012 Views

Avira User Manual

Avira User Manual

Avira User Manual

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Dangerous Applications<br />

Adware/Spyware<br />

Preferences<br />

Software that displays advertising or software that sends the user's personal data to a<br />

third party, often without his knowledge or consent.<br />

Backdoors<br />

In order to steal data or manipulate your Mac, a backdoor server program is smuggled<br />

in, unknown to the user. This program can be controlled by a third party using<br />

backdoor control software (client) via the Internet or a network.<br />

Double extension file<br />

Executable files that hide their real file extension in a suspicious way. This camouflage<br />

method is often used by malware.<br />

Phishing<br />

Also known as brand spoofing, phishing is a clever form of data theft aimed at<br />

customers of Internet providers, online banking services or registration authorities.<br />

When submitting your email address on the Internet, filling in online forms, accessing<br />

newsgroups or websites, your data can be stolen by "Internet crawling spiders" and<br />

then used without your permission to commit fraud or other crimes.<br />

Security privacy risk<br />

Software that may be able to compromise the security of your Mac, initiate unwanted<br />

program activities, damage your privacy or spy on your user behavior.<br />

Unusual runtime packer<br />

Files that have been compressed with an unusual runtime packer and that can<br />

therefore be classified as potentially suspicious.<br />

Unwanted applications<br />

Dubious application<br />

Dialer<br />

Game<br />

Refers to an application which may involve a risk when used or is of dubious origin.<br />

A software program that connects to the Internet via a suitable premium rate number<br />

whose scale of charges can vary widely.<br />

Studies have shown that the number of working hours devoted to computer games<br />

has long reached economically significant proportions. It is therefore not surprising that<br />

more and more companies are considering ways of banning computer games from<br />

workplace computers.<br />

<strong>Avira</strong> Mac Security - <strong>User</strong> <strong>Manual</strong> (Status: 29. 05. 2012) 42

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!