User Manual
User Manual
User Manual
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Viruses and more<br />
registration authorities.<br />
When submitting your email address on the Internet, filling in online forms, accessing<br />
newsgroups or websites, your data can be stolen by "Internet crawling spiders" and then<br />
used without your permission to commit fraud or other crimes.<br />
Your Avira product recognizes "Phishing". If the option Phishing is enabled with a check<br />
mark in the configuration under Threat categories, you receive a corresponding alert if<br />
your Avira product detects such behavior.<br />
Programs that violate the private domain<br />
Software that may be able to compromise the security of your system, initiate unwanted<br />
program activities, damage your privacy or spy on your user behavior and could therefore<br />
be unwanted.<br />
Your Avira product detects "Security Privacy Risk" software. If the option Programs that<br />
violate the private domain is enabled with a check mark in the configuration under<br />
Threat categories, you receive a corresponding alert if your Avira product detects such<br />
software.<br />
Unusual Runtime Packers<br />
Files that have been compressed with an unusual runtime packer and that can therefore<br />
be classified as potentially suspicious.<br />
Your Avira product recognizes "Unusual runtime packers". If the option Unusual runtime<br />
packers is enabled with a check mark in the configuration under Threat categories, you<br />
receive a corresponding alert if your Avira product detects such packers.<br />
9.2 Viruses and other malware<br />
Adware<br />
Adware is software that presents banner ads or in pop-up windows through a bar that<br />
appears on a computer screen. These advertisements usually cannot be removed and are<br />
consequently always visible. The connection data allow many conclusions on the usage<br />
behavior and are problematic in terms of data security.<br />
Backdoors<br />
A backdoor can gain access to a computer by bypassing the computer access security<br />
mechanisms.<br />
A program that is being executed in the background generally enables the attacker almost<br />
unlimited rights. <strong>User</strong>'s personal data can be spied with the backdoor's help.. But are<br />
mainly used to install further computer viruses or worms on the relevant system.<br />
Avira Professional Security - <strong>User</strong> <strong>Manual</strong> (Status: 30 Mar. 2012) 83