Avira antivir server for windows Manual De Usuario

Descargar
Página de 65
 
8  Viruses and more 
 
8.1  Viruses and other malware 
Adware 
Adware is software that presents banner ads or in pop-up windows through a bar that 
appears on a computer screen. These advertisements usually cannot be removed and are 
consequently always visible. The connection data allow many conclusions on the usage 
behavior and are problematic in terms of data security. 
Backdoors 
A backdoor can gain access to a computer by circumventing computer access security 
mechanisms. 
A program that is being executed in the background generally enables the attacker 
almost unlimited rights. User's personal data can be spied with the backdoor's help, but 
are mainly used to install further computer viruses or worms on the relevant system. 
The connection data allow many conclusions on the usage behavior and are problematic 
in terms of data security. 
Boot viruses 
The boot or master boot sector of hard disks is mainly infected by boot sector viruses. 
They overwrite important information necessary for the system execution. One of the 
awkward consequences: the computer system cannot be loaded any more&ldots; 
Bot-Net 
A bot net is defined as a remote network of PCs (on the Internet), which is composed of 
bots that communicate with each other. A Bot-Net can comprise a collection of cracked 
machines running programs (usually referred to as worms, Trojans) under a common 
command and control infrastructure. Bot-Nets serve various purposes, including Denial-
of-service attacks etc., partly without the affected PC user's knowledge. The main 
potential of Bot-Nets is that the networks can achieve dimensions on thousands of 
computers and its bandwidth sum bursts most conventional Internet accesses. 
Exploit 
An exploit (security gap) is a computer program or script that takes advantage of a bug, 
glitch or vulnerability leading to privilege escalation or denial of service on a computer 
system. A form of an exploit for example are attacks from the Internet with the help of 
manipulated data packages. Programs can be infiltrated in order to obtain higher access. 
Hoaxes 
19