Remote access: Programs that allow access over the Internet from another
■
computer to gain information or to attack or alter your computer. For
example, you may install a program, or it may be installed as part of some
other process without your knowledge. The program can be used for
malicious purposes with or without modification of the original remote
access program.
Trackware: Stand-alone or appended applications that trace a user's path
■
on the Internet and send information to a target system. For example, the
application can be downloaded from Web sites, email messages, or instant
messenger software. It can then obtain confidential information regarding
user behavior.
By default, all Symantec AntiVirus scans, including Auto-Protect scans, check
for viruses, Trojan horses, worms, and all categories of security risks.
See
"Using Auto-Protect"
See
"Initiating manual scans"
The Symantec™ Security Response Web site provides the latest information
about threats and security risks. The Web site also contains extensive reference
information, such as white papers and detailed information about viruses and
security risks.
Figure 1-1
shows information about a hack tool and how Symantec Security
Response suggests that you handle it.
on page 43.
on page 52.
Introducing Symantec AntiVirus
About security risks
15