12.08.2012 Views

User Manual

User Manual

User Manual

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Boot viruses<br />

The boot or master boot sector of hard disks is mainly infected by boot sector viruses.<br />

They overwrite important information necessary for the system execution. One of the<br />

awkward consequences: the computer system cannot be loaded any more…<br />

Bot-Net<br />

Viruses and more<br />

A bot-net is defined as a remote network of PCs (on the Internet) that is composed of bots<br />

that communicate with each other. A bot-net can comprise a collection of cracked<br />

machines running programs (usually referred to as worms, Trojans) under a common<br />

command and control infrastructure. Bot-nets serve various purposes, including denial-ofservice<br />

attacks etc., usually without the affected PC user's knowledge. The main potential<br />

of bot-nets is that the networks can achieve grow to thousands of computers and their total<br />

bandwidth exceeds most conventional Internet accesses.<br />

Exploit<br />

An exploit (security gap) is a computer program or script that takes advantage of a bug,<br />

glitch or vulnerability leading to privilege escalation or denial of service on a computer<br />

system. One form of exploitation for example is an attack from the Internet with the help of<br />

manipulated data packages. Programs can be infiltrated in order to obtain higher access.<br />

Fraudulent software<br />

Also known as "scareware" or "rogueware", it is a fraudulent software that pretends that<br />

your computer is infected by viruses or malware. This software looks deceptively similar to<br />

professional Antivirus software but is meant to raise uncertainty or to scare the user. Its<br />

purpose is to make the victims feel threatened of imminent (unreal) danger and to make<br />

them pay to eliminate it. There are also cases when the victims are lead to believe they<br />

were attacked and they are instructed to carry out an action, which in reality is the real<br />

attack.<br />

Hoaxes<br />

For several years, Internet and other network users have received alerts about viruses that<br />

are purportedly spread via email. These alerts are spread via email with the request that<br />

they should be sent to the highest possible number of colleagues and to other users, in<br />

order to warn everyone against the "danger".<br />

Honeypot<br />

A honeypot is a service (program or server) installed in a network. Its function is to monitor<br />

a network and log attacks. This service is unknown to the legitimate user - because of this<br />

Avira Professional Security - <strong>User</strong> <strong>Manual</strong> (Status: 30 Mar. 2012) 84

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!