Acronis privacy expert suite 8.0 Manuale Utente

Pagina di 71
Spyware threats glossary
Copyright © Acronis, Inc., 2000-2005 
71
Exploit/Security holes 
These are security bugs and vulnerabilities in applications primarily meant for 
Web operations. Through such holes, intruders can corrupt a PC or gain remote 
control over it.  
Remote Administration  
A kind of software, including commercial, designed for remote PC control. In 
some cases, users might not be aware of such applications running. 
Sniffers 
Programs that capture network traffic (sent and received data packets). Sniffers 
could be a serious threat, able to capture and decrypt user names, passwords 
and private information and prevent normal operation of computers and network 
in general. As most protocols (FTP, POP, HTTP, telnet) have secret information 
transmitted unencrypted, an intruder can easily gain access to a user’s 
information by setting up sniffer filters and waiting for the victim to connect to a 
server. 
Spyware 
Programs that secretly gather and transmit personal user information. Spyware 
can be a part of various applications, including commercial products. 
Toolbars 
Toolbars can be downloaded to your Web browser to make browsing easier. 
Examples include the Google, Alexa and Yahoo toolbars. Even though these are 
very handy to use, they have the ability to track everything you do on the 
Internet and to pass that information back to the owners of the toolbars. Be sure 
to read the terms and conditions page before you download any toolbar. 
Trojan Horses (Trojans) 
Trojans are specially created programs that are deployed to PCs imitating useful 
applications and utilities. They can result in failures, lock-ups or even complete 
data destruction. Trojans are spread via mailing lists, Web forums, etc.