12.08.2012 Views

User Manual

User Manual

User Manual

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Viruses and more<br />

registration authorities.<br />

When submitting your email address on the Internet, filling in online forms, accessing<br />

newsgroups or websites, your data can be stolen by "Internet crawling spiders" and then<br />

used without your permission to commit fraud or other crimes.<br />

Your Avira product recognizes "Phishing". If the option Phishing is enabled with a check<br />

mark in the configuration under Threat categories, you receive a corresponding alert if<br />

your Avira product detects such behavior.<br />

Programs that violate the private domain<br />

Software that may be able to compromise the security of your system, initiate unwanted<br />

program activities, damage your privacy or spy on your user behavior and could therefore<br />

be unwanted.<br />

Your Avira product detects "Security Privacy Risk" software. If the option Programs that<br />

violate the private domain is enabled with a check mark in the configuration under<br />

Threat categories, you receive a corresponding alert if your Avira product detects such<br />

software.<br />

Unusual Runtime Packers<br />

Files that have been compressed with an unusual runtime packer and that can therefore<br />

be classified as potentially suspicious.<br />

Your Avira product recognizes "Unusual runtime packers". If the option Unusual runtime<br />

packers is enabled with a check mark in the configuration under Threat categories, you<br />

receive a corresponding alert if your Avira product detects such packers.<br />

9.2 Viruses and other malware<br />

Adware<br />

Adware is software that presents banner ads or in pop-up windows through a bar that<br />

appears on a computer screen. These advertisements usually cannot be removed and are<br />

consequently always visible. The connection data allow many conclusions on the usage<br />

behavior and are problematic in terms of data security.<br />

Backdoors<br />

A backdoor can gain access to a computer by bypassing the computer access security<br />

mechanisms.<br />

A program that is being executed in the background generally enables the attacker almost<br />

unlimited rights. <strong>User</strong>'s personal data can be spied with the backdoor's help.. But are<br />

mainly used to install further computer viruses or worms on the relevant system.<br />

Avira Professional Security - <strong>User</strong> <strong>Manual</strong> (Status: 30 Mar. 2012) 83

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!