User Manual
User Manual
User Manual
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Boot viruses<br />
The boot or master boot sector of hard disks is mainly infected by boot sector viruses.<br />
They overwrite important information necessary for the system execution. One of the<br />
awkward consequences: the computer system cannot be loaded any more…<br />
Bot-Net<br />
Viruses and more<br />
A bot-net is defined as a remote network of PCs (on the Internet) that is composed of bots<br />
that communicate with each other. A bot-net can comprise a collection of cracked<br />
machines running programs (usually referred to as worms, Trojans) under a common<br />
command and control infrastructure. Bot-nets serve various purposes, including denial-ofservice<br />
attacks etc., usually without the affected PC user's knowledge. The main potential<br />
of bot-nets is that the networks can achieve grow to thousands of computers and their total<br />
bandwidth exceeds most conventional Internet accesses.<br />
Exploit<br />
An exploit (security gap) is a computer program or script that takes advantage of a bug,<br />
glitch or vulnerability leading to privilege escalation or denial of service on a computer<br />
system. One form of exploitation for example is an attack from the Internet with the help of<br />
manipulated data packages. Programs can be infiltrated in order to obtain higher access.<br />
Fraudulent software<br />
Also known as "scareware" or "rogueware", it is a fraudulent software that pretends that<br />
your computer is infected by viruses or malware. This software looks deceptively similar to<br />
professional Antivirus software but is meant to raise uncertainty or to scare the user. Its<br />
purpose is to make the victims feel threatened of imminent (unreal) danger and to make<br />
them pay to eliminate it. There are also cases when the victims are lead to believe they<br />
were attacked and they are instructed to carry out an action, which in reality is the real<br />
attack.<br />
Hoaxes<br />
For several years, Internet and other network users have received alerts about viruses that<br />
are purportedly spread via email. These alerts are spread via email with the request that<br />
they should be sent to the highest possible number of colleagues and to other users, in<br />
order to warn everyone against the "danger".<br />
Honeypot<br />
A honeypot is a service (program or server) installed in a network. Its function is to monitor<br />
a network and log attacks. This service is unknown to the legitimate user - because of this<br />
Avira Professional Security - <strong>User</strong> <strong>Manual</strong> (Status: 30 Mar. 2012) 84