Exploit/Security Holes; Remote Administration; Sniffers; Spyware - ACRONIS PRIVACY EXPERT CORPORATE User Manual

Hide thumbs Also See for PRIVACY EXPERT CORPORATE:
Table of Contents

Advertisement

Exploit/Security holes

These are security bugs and vulnerabilities in applications primarily meant for
Web operations. Through such holes, intruders can corrupt a PC or gain remote
control over it.

Remote Administration

This is a kind of software, including commercial software, designed for remote
PC control. In some cases, users might not be aware of such applications
running.

Sniffers

Sniffers are programs that capture network traffic (sent and received data
packets). Sniffers can be a serious threat, able to capture and decrypt user
names, passwords and private information and prevent normal operation of
computers and networks in general. As most protocols (FTP, POP, HTTP, telnet)
have secret information transmitted unencrypted, an intruder can easily gain
access to a user's information by setting up sniffer filters and waiting for the
victim to connect to a server.

Spyware

Spyware are programs that secretly gather and transmit personal user
information. Spyware can be a part of various applications, including commercial
products.

Toolbars

Toolbars can be downloaded to your Web browser to make browsing easier.
Examples include the Google, Alexa and Yahoo toolbars. Even though these are
very handy to use, they have the ability to track everything you do on the
Internet and to pass that information back to the owners of the toolbars. Be sure
to read the terms and conditions page before you download any toolbar.

Trojan Horses (Trojans)

Trojans are specially created programs that are deployed to PCs imitating useful
applications and utilities. They can result in failures, lock-ups or even complete
data destruction. Trojans are spread via mailing lists, Web forums, etc.
Copyright © Acronis, Inc., 2000-2005
Spyware threats glossary
39

Advertisement

Table of Contents
loading

Table of Contents