User Manual

Table Of Contents
and TeslaWall, are only some variants that hunt personal systems of
users.
The infection can be spread by accessing spam emails, downloading
email attachments, or installing apps, without letting the user know
about what is happening on his system. Daily users and companies are
targeted by ransomware hackers.
Report file
A file that lists actions that have occurred. Bitdefender maintains a report
file listing the path scanned, the folders, the number of archives and files
scanned, how many infected and suspicious files were found.
Rootkit
A rootkit is a set of software tools which offer administrator-level access
to a system. The term was first used for the UNIX operating systems
and it referred to recompiled tools which provided intruders
administrative rights, allowing them to conceal their presence so as not
to be seen by the system administrators.
The main role of rootkits is to hide processes, files, logins and logs. They
may also intercept data from terminals, network connections or
peripherals, if they incorporate the appropriate software.
Rootkits are not malicious in nature. For example, systems and even
some apps hide critical files using rootkits. However, they are mostly
used to hide threats or to conceal the presence of an intruder into the
system. When combined with threats, rootkits pose a great threat to the
integrity and the security of a system. They can monitor traffic, create
backdoors into the system, alter files and logs and avoid detection.
Script
Another term for macro or batch file, a script is a list of commands that
can be executed without user interaction.
Spam
Electronic junk mail or junk newsgroup postings. Generally known as
any unsolicited email.
Spyware
Any software that covertly gathers user information through the user's
internet connection without his or her knowledge, usually for advertising
Glossary 310
Bitdefender Total Security