User manual
Table Of Contents

AntiVir SharePoint
But beware!
All symptoms of joke programs may also originate from a virus or Trojan. At
the very least users will get quite a shock or be thrown into such a panic that they
themselves may cause real damage.
Security Privacy Risk (SPR)
Software that maybe is able to compromise the security of your system, initiate
unwanted program activities, damage your privacy or spy out your user behavior and
might therefore be unwanted.
Backdoor Clients (BDC)
In order to steal data or manipulate computers, a "backdoor" server program is smuggled
in unknown to the user. This program can be controlled by a third party using backdoor
control software (client) via the Internet or a network.
Adware/Spyware (ADSPY)
Software that displays advertising or software that sends the user's personal data
to a third party, often without their knowledge or consent, and for this reason may be
unwanted.
Unusual Runtime Compression Tools (PCK)
Files that have been compressed with an unusual runtime compression tool and that can
therefore be classified as possibly suspicious.
Double Extension Files (HEUR-DBLEXT)
Executable files that hide their real file extension in a suspicious way. This camouflage
method is often used by malware.
Phishing
Phishing, also known as brand spoofing is a clever form of data theft aimed at customers
or potential customers of Internet service providers, banks, online banking services,
registration authorities.
When submitting your email address on the Internet, filling in online forms, accessing
newsgroups or websites, your data can be stolen by "Internet crawling spiders" and then
used without your permission to commit fraud or other crimes.
Application (APPL)
The term APPL refers to an application which may involve a risk when used or is of
dubious origin.
Possible Fake Software (PFS)
The designation PFS ("Possible Fake Software") indicates software that usually comes at
a charge but that contains no functions or that installs dubious components.
14