29.07.2012 Views

Avira User Manual

Avira User Manual

Avira User Manual

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

You may change the detection level by moving the slider control.<br />

� Low: Weakest detection level with a low risk that clean files will be detected as<br />

infected.<br />

� Medium: Strong detection level with a low risk that clean files will be detected as<br />

infected.<br />

� High: Strongest detection level with a higher risk that clean files will be detected as<br />

infected.<br />

7.8 Threat Categories<br />

Preferences<br />

<strong>Avira</strong> Mac Security not only searches for all kinds of viruses but protects your Mac against<br />

various other threats, such as dangerous or unwanted applications. If you are not sure<br />

what kind of threats you want your <strong>Avira</strong> product to scan for, keep the default values.<br />

Dangerous Applications<br />

Adware/Spyware<br />

Software that displays advertising or software that sends the user's personal data to a<br />

third party, often without his knowledge or consent.<br />

Backdoors<br />

In order to steal data or manipulate your Mac, a backdoor server program is smuggled<br />

in, unknown to the user. This program can be controlled by a third party using<br />

backdoor control software (client) via the Internet or a network.<br />

Double extension file<br />

Executable files that hide their real file extension in a suspicious way. This camouflage<br />

method is often used by malware.<br />

Phishing<br />

Also known as brand spoofing, phishing is a clever form of data theft aimed at<br />

customers of Internet providers, online banking services or registration authorities.<br />

When submitting your email address on the Internet, filling in online forms, accessing<br />

newsgroups or websites, your data can be stolen by "Internet crawling spiders" and<br />

then used without your permission to commit fraud or other crimes.<br />

Security privacy risk<br />

Software that may be able to compromise the security of your Mac, initiate unwanted<br />

program activities, damage your privacy or spy on your user behavior.<br />

Unusual runtime packer<br />

Files that have been compressed with an unusual runtime packer and that can<br />

therefore be classified as potentially suspicious.<br />

<strong>Avira</strong> Mac Security - <strong>User</strong> <strong>Manual</strong> (Status: 29. 05. 2012) 46

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!