EasyManuals Logo

ESET SMART SECURITY User Manual

ESET SMART SECURITY
38 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #36 background imageLoading...
Page #36 background image
36
perform tracking functions (as spyware also does).
If you decide to use a freeware product, please pay particular
attention to the installation program. The installer will most likely
notify you of the installation of an extra adware program. Often you
will be allowed to cancel it and install the program without adware.
On the other hand, some programs will not install without adware, or
their functionality will be limited. This means that adware may often
access the system in a “legal” way, because users have agreed to it. In
this case, it is better to be safe than sorry.
If there is a file detected as adware on your computer, it is advised to
delete it, since it most likely contains malicious code.
6.1.6 Spyware
This category covers all applications which send private information
without user consent/awareness. They use tracking functions to
send various statistical data such as a list of visited web sites, email
addresses from the user‘s contact list, or a list of recorded keystrokes.
The authors of spyware claim that these techniques aim to find out
more about users’ needs and interests and allow better‑targeted
advertisement. The problem is that there is no clear distinction
between useful and malicious applications and no one can be sure
that the retrieved information will not be misused. The data obtained
by spyware applications may contain security codes, PINs, bank
account numbers, etc. Spyware is often bundled with free versions
of a program by its author in order to generate revenue or to oer an
incentive for purchasing the software. Often, users are informed of
the presence of spyware during a program‘s installation to give them
an incentive to upgrade to a paid version without it.
Examples of well‑known freeware products which come bundled
with spyware are client applications of P2P (peer‑to‑peer) networks.
Spyfalcon or Spy Sheri (and many more) belong to a specific spyware
subcategory – they appear to be antispyware programs, but in fact
they are spyware programs themselves.
If there is a file detected as spyware on your computer, it is advisable
to delete it, since it most likely contains malicious code.
6.1.7 Potentially unsafe applications
There are many legitimate programs which serve to simplify the
administration of networked computers. However, in the wrong
hands, they may be misused for malicious purposes. This is why ESET
has created this special category. Our clients now have the option to
choose whether the antivirus system should or should not detect such
threats.
“Potentially unsafe applications” is the classification used for
commercial, legitimate software. This classification includes programs
such as remote access tools, password‑cracking applications, and
keyloggers (a program recording each keystroke a user types).
If you find that there is a potentially unsafe application present and
running on your computer (and you did not install it), please consult
your network administrator or remove the application.
6.1.8 Potentially unwanted applications
Potentially unwanted applications are not necessarily intended to
be malicious, but may aect the performance of your computer
in a negative way. Such applications usually require consent for
installation. If they are present on your computer, your system
behaves dierently (compared to the state before their installation).
The most significant changes are:
new windows you haven’t seen previously are opened
activation and running of hidden processes
increased usage of system resources
changes in search results
application communicates with remote servers
6.2 Types of remote attacks
There are many special techniques which allow attackers to
compromise remote systems. These are divided into several categories.
6.2.1 DoS attacks
DoS, or Denial of Service, is an attempt to make a computer or
network unavailable for its intended users. The communication
between aicted users is obstructed and can no longer continue in a
functional way. Computers exposed to DoS attacks usually need to be
restarted in order to work properly.
In most cases, the targets are web servers and the aim is to make
them unavailable for users for a certain period of time.
6.2.2 DNS Poisoning
Through the DNS (Domain Name Server) poisoning method, hackers
can trick the DNS server of any computer into believing that the fake
data they supplied is legitimate and authentic. The fake information
is cached for a certain period of time, allowing attackers to rewrite
DNS replies of IP addresses. As a result, users trying to access Internet
web sites will download computer viruses or worms instead of their
original content.
6.2.3 Worm attacks
A computer worm is a program containing malicious code that
attacks host computers and spreads via a network. The network
worms exploit security vulnerabilities in various applications. Due
to the availability of the Internet, they can spread all over the world
within a few hours of their release. In some cases, even in minutes.
Most worm attacks (Sasser, SqlSlammer) can be avoided by using
default security settings in the firewall, or by blocking unprotected
and unused ports. Also, it is essential that your operating system is
updated with the most recent security patches.
6.2.4 Port scanning
Port scanning controls whether there are open computer ports on
a network host. A port scanner is software designed to find such ports.
A computer port is a virtual point which handles incoming and
outgoing data – this is crucial from a security point of view. In a large
network, the information gathered by port scanners may help to
identify potential vulnerabilities. Such use is legitimate.
Still, port scanning is often used by hackers attempting to
compromise security. Their first step is to send packets to each
port. Depending on the response type, it is possible to determine
which ports are in use. The scanning itself causes no damage, but be
aware that this activity can reveal potential vulnerabilities and allow
attackers to take control of remote computers.
Network administrators are advised to block all unused ports and
protect those that are in use from unauthorized access.
6.2.5 TCP desynchronization
TCP desynchronization is a technique used in TCP Hijacking attacks.
It is triggered by a process in which the sequential number in incoming
packets diers from the expected sequential number. The packets
with an unexpected sequential number are dismissed (or saved in
the buer storage, if they are present in the current communication
window).
In the state of desynchronization, both communication endpoints

Table of Contents

Other manuals for ESET SMART SECURITY

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the ESET SMART SECURITY and is the answer not in the manual?

ESET SMART SECURITY Specifications

General IconGeneral
TypeAntivirus security
Number of PCs3
Software typeBox
Language versionTurkish
License quantity3 license(s)
License term in years1 year(s)
PlatformPC
Minimum processor-
Minimum storage drive space- MB
Mac operating systems supportedNo
Windows operating systems supportedYes

Related product manuals