Product manual

Programs containing
malicious codes that are
disguised as or hiding in
something benign, such as a
game or utility.
Trojan horses
Tools that are used by a
hacker to gain unauthorized
access to your computer. One
type of hacking tool, a
keystroke logger, tracks and
records your individual
keystrokes and can send this
information back to the
hacker.
Hacking tools
Programs that can scan
systems or monitor activity
and relay the information to
other computers or locations
in cyberspace.
Spyware
Programs that facilitate the
delivery of advertising
content through their own
window, or by using another
program's interface.
Adware
41Getting Started
About Norton Bootable Recovery Tool