User manual

Viruses and more
Avira Professional Security - User Manual (Status: 14 Dec. 2012) 86
Hoaxes
For several years, Internet and other network users have received alerts about viruses that
are purportedly spread via email. These alerts are spread via email with the request that
they should be sent to the highest possible number of colleagues and to other users, in
order to warn everyone against the "danger".
Honeypot
A honeypot is a service (program or server) installed in a network. Its function is to monitor
a network and log attacks. This service is unknown to the legitimate user - because of this
reason he is never addressed. If an attacker examines a network for the weak points and
uses the services which are offered by a honeypot, it is logged and an alert is triggered.
Macro viruses
Macro viruses are small programs that are written in the macro language of an application
(e.g. WordBasic under WinWord 6.0) and that can normally only spread within documents
of this application. Because of this, they are also called document viruses. In order to be
active, they need that the corresponding applications are activated and that one of the
infected macros has been executed. Unlike "normal" viruses, macro viruses consequently
do not attack executable files but they do attack the documents of the corresponding host
application.
Pharming
Pharming is a manipulation of the host file of web browsers to divert enquiries to spoofed
websites. This is a further development of classic phishing. Pharming fraudsters operate
their own large server farms on which fake websites are stored. Pharming has established
itself as an umbrella term for various types of DNS attacks. In the case of a manipulation
of the host file, a specific manipulation of a system is carried out with the aid of a Trojan or
virus. The result is that the system can now only access fake websites, even if the correct
web address is entered.
Phishing
Phishing means angling for personal details of the Internet user. Phishers generally send
their victims apparently official letters such as emails that are intended to induce them to
reveal confidential information to the culprits in good faith, in particular user names and
passwords or PINs and TANs of online banking accounts. With the stolen access details,
the phishers can assume the identities of the victims and carry out transactions in their
name. What is clear is that: banks and insurance companies never ask for credit card
numbers, PINs, TANs or other access details by email, SMS or telephone.