System information

Threats to computer security 37
Anti-phishing databases contain the list URLs of websites known as sites used
for phishing attacks.
Kaspersky Lab's application analyzes incoming Microsoft Office Outlook and
Microsoft Outlook Express messages and if it finds a link to a URL included into
the databases, it marks this message as Spam. If the user opens the message
and tries to follow the link, the application blocks this website.
HACKER ATTACKS
Network attack is an intrusion into a remote computer's system in order to gain
control over it and cause its failure or obtain access to protected information.
Network attacks are either actions of intruders (for example, scanning ports,
attempts to hack passwords) or malware programs running commands on user's
behalf and transferring information to its "master" or perform other functions
related to network attacks. They include some Trojan programs, DoS attacks,
malicious scripts and certain types of network worms.
Network attacks are spread in the local area and global networks using
vulnerabilities in the operating systems and applications. They can be transferred
as individual IP data packets during network connections.
Kaspersky Lab's application stops network attacks without disrupting network
connections. It uses special Firewall databases. These databases contain
records identifying IP data packets characteristic of various hacking programs.
The application analyzes network connections and blocks in them those IP
packets it finds dangerous.
BANNERS DISPLAY
Banners or ads which are links to the advertiser's website are more often than
not displayed as images. Display of banners on the website does not impose any
threat to the computer's security, but is still considered an interference into the
normal operation of the computer. Banner's flickering on the screen worsens
working conditions decreasing efficiency. The user is distracted by irrelevant
information. Following banner links increases the internet traffic.
Many organizations prohibit displaying banners in the interfaces as a part of their
data security policies.