ESET SMART SECURITY User's Guide Page 114

  • Download
  • Add to my manuals
  • Print
  • Page
    / 120
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 113
114
6.1.7 Packers
Packer is a runtime self-extracting executable that rolls up several kinds of malware into a single package.
The most common packers are UPX, PE_Compact, PKLite and ASPack. The same malware may be detected
differently when compressed using a different packer. Packers also have the ability to make their "signatures"
mutate over time, making malware more difficult to detect and remove.
6.1.8 Potentially unsafe applications
There are many legitimate programs whose function is to simplify the administration of networked computers.
However, in the wrong hands, they may be misused for malicious purposes. ESET Smart Security provides the option
to detect such threats.
Potentially unsafe applications is the classification used for commercial, legitimate software. This classification
includes programs such as remote access tools, password-cracking applications, and keyloggers (a program that
records each keystroke a user types).
If you find that there is a potentially unsafe application present and running on your computer (and you did not
install it), please consult your network administrator or remove the application.
6.1.9 Potentially unwanted applications
Potentially unwanted applications (PUAs) are not necessarily intended to be malicious, but may affect the
performance of your computer in a negative way. Such applications usually require consent before installation. If
they are present on your computer, your system behaves differently (compared to the state before their
installation). The most significant changes are:
New windows you haven’t seen previously (pop-ups, ads),
Activating and running of hidden processes,
Increased usage of system resources,
Changes in search results,
Application communicates with remote servers.
6.1.10 Botnet
A bot, or a web robot is an automated malware program that scans blocks of network addresses and infects
vulnerable computers. This allow hackers to take control of many computers at the same time and turn them into
bots (also known as a zombie). Hackers typically use bots to infect large numbers of computers, which form a
network or a botnet. Once the botnet is in your computer, it can be used in distributed denial of service (DDoS)
attacks, proxy and also can be used to perform automated tasks over the Internet, without you knowing it (for
example sending spam, viruses or stealing personal and private information such as bank credentials or credit card
numbers).
6.2 Types of remote attacks
There are many special techniques which allow attackers to compromise remote systems. These are divided into
several categories.
Page view 113

Comments to this Manuals

No comments