Worms, Viruses, And Trojans - Novell ZENWORKS NETWORK ACCESS CONTROL 5.0 - 09-22-2008 User Manual

Table of Contents

Advertisement

You can also specify which key to use for the specific value by entering the key at the beginning of
the value. For example:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Messenger
How Does this Affect Me?
Connecting to a network may be impossible if the correct software is not installed and operational.
What Do I Need to Do?
Contact the vendor and install the missing software.
B.5.9 Worms, Viruses, and Trojans
The following sections contain more information:
"Description:" on page 435
"Test Properties" on page 435
"How Does this Affect Me?" on page 435
"What Do I Need to Do?" on page 435
Description:
This test verifies that the endpoint attempting to connect to your system does not have any of the
worms, viruses, or trojans listed.
Test Properties
This area of the window displays the current list of worms, viruses, and trojans. No selection actions
are required.
How Does this Affect Me?
A virus is a program that infects other programs and files and can spread when a user opens a
program or file containing the virus. A virus needs a host (the program or file) to spread. A worm is
a program that can also perform malicious acts (such as delete files and send email); however, it
replicates itself—it does not need a host (program or file) to spread. Frequently, worms are used to
install a backdoor (a way for an attacker to gain access without having to login). A trojan horse is a
stand-alone program that is not what it seems. For example, it may seem to be calendar program, but
when you open it, it erases all your files and displays a message, such as "Ha ha, I deleted your
files!" Trojan horse programs do not spread or replicate themselves.
What Do I Need to Do?
Make sure you are running an anti-virus software program, and that it is kept up-to-date.
Tests Help 435

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zenworks network access control 5.0

Table of Contents