Product manual

Monitors the Trojan horses and
other malicious programs that
bypass network traffic.
These programs penetrate the
Windows TCP/IP layer to send
and receive data without
triggering firewall alerts.
Direct Network Access
Monitors the malicious programs
that use the documented
interfaces that the trusted
applications provide to transmit
data outside the network
without triggering firewall alerts
Active Desktop Change
Monitors the malicious keylogger
programs that access personal
information of a user on a
particular computer by
monitoring their keystroke
activities.
Key Logger Monitor
Monitors the malicious programs
that manipulate an application's
behavior by instantiating
controlled COM objects.
COM Control
About Norton AntiSpam settings
With the increase in usage of email, many users receive
a number of unwanted and unsolicited commercial
email messages that are known as spam. Not only does
spam make it difficult to identify valid email messages,
but some spam contains offensive messages and
images.
Norton AntiSpam incorporates several powerful
features to reduce your exposure to unwanted online
content.
539Customizing settings
About Norton AntiSpam settings