User manual

Table Of Contents
A V G Internet Security 201 2 © 2012 C opyright A V G Technologies C Z, s.r.o. A ll rights res erved. 14 0
checked if really infected, to sort out false positives.
Most common threats
Nowadays, there are far more threats out there than plain viruses. Authors of malicious codes and
dangerous websites are very innovative, and new kinds of threats emerge quite often, the vast
majority of which are on the Internet. Here are some of the most common:
Virus is a malicious code that copies and spreads itself, often unnoticed until the damage
is done. Some viruses are a serious threat, deleting or deliberately changing files on their
way, while some viruses can do something seemingly harmless, like playing a piece of
music. However, all viruses are dangerous due to the basic ability of multiplying – even a
simple virus can take up all the computer memory in an instant, and cause a breakdown.
Worm is a subcategory of virus which, unlike a normal virus, does not need a "carrier"
object to attach to; it sends itself to other computers self-contained, usually via e-mail, and
as a result often overloads e-mail servers and network systems.
Spyware is usually defined as a malware category (malware = any malicious software,
including viruses) encompassing programs typically Trojan horses – aimed at stealing
personal information, passwords, credit card numbers, or infiltrating a computer and
allowing the attacker to control it remotely; of course, all without the computer owner's
knowledge or consent.
Potentially unwanted programs are a type of spyware that can but not necessarily be
dangerous to your computer. A specific example of a PUP is adware, software designed to
distribute advertisements, usually by displaying ad pop-ups; annoying, but not really
harmful.
Tracking cookies can also be considered a kind of spyware, as these small files, stored in
the web browser and sent automatically to the "parent" website when you visit it again, can
contain data such as your browsing history and other similar information.
Exploit is a malicious code that takes advantage of a flaw or vulnerability in an operating
system, Internet browser, or other essential program.
Phishing is an attempt to acquire sensitive personal data by shamming a trustworthy and
well-known organization. Usually, the potential victims are contacted by a bulk e-mail
asking them to e.g. update their bank account details. In order to do that, they are invited to
follow the link provided which then leads to a fake website of the bank.
Hoax is a bulk e-mail containing dangerous, alarming or just bothering and useless
information. Many of the above threats use hoax e-mail messages to spread.
Malicious websites are ones that deliberately install malicious software on your computer,
and hacked sites do just the same, only these are legitimate websites that have been
compromised into infecting visitors.
To protect you from all of these different kinds of threats, AVG Internet Security 2012 includes
specialized components. For brief description of these please consult the Components