Acronis privacy expert suite 8.0 Manuale Utente
![Acronis](https://files.manualsbrain.com/attachments/d25739ab1d394aabb072edccd531cb4626454aab/common/fit/150/50/b2880b84f19a7e2f83584d83b67e44b998a1e8639a6c32decffac69cfe72/brand_logo.gif)
Spyware threats glossary
Copyright © Acronis, Inc., 2000-2005
71
Exploit/Security holes
These are security bugs and vulnerabilities in applications primarily meant for
Web operations. Through such holes, intruders can corrupt a PC or gain remote
control over it.
Web operations. Through such holes, intruders can corrupt a PC or gain remote
control over it.
Remote Administration
A kind of software, including commercial, designed for remote PC control. In
some cases, users might not be aware of such applications running.
some cases, users might not be aware of such applications running.
Sniffers
Programs that capture network traffic (sent and received data packets). Sniffers
could be a serious threat, able to capture and decrypt user names, passwords
and private information and prevent normal operation of computers and network
in general. As most protocols (FTP, POP, HTTP, telnet) have secret information
transmitted unencrypted, an intruder can easily gain access to a user’s
information by setting up sniffer filters and waiting for the victim to connect to a
server.
could be a serious threat, able to capture and decrypt user names, passwords
and private information and prevent normal operation of computers and network
in general. As most protocols (FTP, POP, HTTP, telnet) have secret information
transmitted unencrypted, an intruder can easily gain access to a user’s
information by setting up sniffer filters and waiting for the victim to connect to a
server.
Spyware
Programs that secretly gather and transmit personal user information. Spyware
can be a part of various applications, including commercial products.
can be a part of various applications, including commercial products.
Toolbars
Toolbars can be downloaded to your Web browser to make browsing easier.
Examples include the Google, Alexa and Yahoo toolbars. Even though these are
very handy to use, they have the ability to track everything you do on the
Internet and to pass that information back to the owners of the toolbars. Be sure
to read the terms and conditions page before you download any toolbar.
Examples include the Google, Alexa and Yahoo toolbars. Even though these are
very handy to use, they have the ability to track everything you do on the
Internet and to pass that information back to the owners of the toolbars. Be sure
to read the terms and conditions page before you download any toolbar.
Trojan Horses (Trojans)
Trojans are specially created programs that are deployed to PCs imitating useful
applications and utilities. They can result in failures, lock-ups or even complete
data destruction. Trojans are spread via mailing lists, Web forums, etc.
applications and utilities. They can result in failures, lock-ups or even complete
data destruction. Trojans are spread via mailing lists, Web forums, etc.