Symantec ™ Internet Security 2012 Handbuch Seite 38

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 334
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 37
Norton Bootable Recovery Tool detects and resolves
the following security threats:
Programs that infect another
program, boot sector,
partition sector, or document
by inserting themselves or
attaching themselves to that
medium. Most viruses just
replicate; many also do
damage.
Viruses
Programs containing
malicious codes that are
disguised as or hiding in
something benign, such as a
game or utility.
Trojan horses
Tools that are used by a
hacker to gain unauthorized
access to your computer. One
type of hacking tool, a
keystroke logger, tracks and
records your individual
keystrokes and can send this
information back to the
hacker.
Hacking tools
Programs that can scan
systems or monitor activity
and relay the information to
other computers or locations
in cyberspace.
Spyware
Programs that facilitate the
delivery of advertising
content through their own
window, or by using another
program's interface.
Adware
Getting started
About Norton Bootable Recovery Tool
38
Seitenansicht 37
1 2 ... 33 34 35 36 37 38 39 40 41 42 43 ... 333 334

Kommentare zu diesen Handbüchern

Keine Kommentare