Nasty Applets; Can I Prevent Programs From Accessing The Internet; Computer Viruses And The Web - McAfee GUARD DOG 2 User Manual

Table of Contents

Advertisement

Internet Security and Privacy
Java contains an internal security system that addresses security risks. ActiveX
uses a different model, based on certificate authentication. Certificates contain
information about who developed the ActiveX code. The idea here is that if
you know who developed the code, it is safe to run it. Both security schemes
offer a level of safety, but no one can yet promise that executable content is
entirely safe.

Nasty applets

One possible security threat is a malign Java or Active X program that attacks
your computer over the Web. A nasty applet might, for example, thwart Java
security by circumventing its security model, and destroy data on your hard
disk, or grab sensitive information from your hard drive. The latest browsers
have done a good job of fixing these issues. As long as you are using the latest
version of your browser you are protected. To date, there have been no
legitimate reports of hostile Java or ActiveX harming anyone. However, there
is no guarantee that an attack will not happen in the future.

Can I prevent programs from accessing the Internet?

You can use Guard Dog to specify the applications that are allowed to access
the Internet from your computer. Obviously, your default Internet browser is
one of these applications.
If the Guard Dog Gatekeeper is running in the background while you work on
the Internet, each time an application tries to access the Internet a dialog box
appears to ask if you want to allow this access once only, always, or never.

Computer viruses and the Web

A computer virus is a small computer program that automatically replicates
itself and spreads from PC to PC. Viruses may infect programs, your hard
drive, and even some document files that employ macros. Viruses do not
infect data files, but they can create problems that prevent you from accessing
your data. Viruses are not accidents—they are always created by computer
programmers.
PC viruses are similar to biological viruses in that they:
• Are spread from host to host—the "host," in this instance, is your PC.
• Are very good at reproducing themselves.
• Can wreak havoc in an infected host system.
66
McAfee Guard Dog

Advertisement

Table of Contents
loading

This manual is also suitable for:

Guard dog

Table of Contents