2012
Table Of Contents
- Norton™ Internet Security Product Manual
- Contents
- 1. Getting started
- 2. Monitoring your system's performance
- 3. Protecting your files and data
- 4. Responding to security issues
- 5. Protecting Internet activities
- 6. Securing your sensitive data
- 7. Monitoring protection features
- 8. Customizing protection features
- 9. Finding additional solutions
- Index
should leave the signatures turned on. If you disable a
signature, your computer may be vulnerable to attack.
To view details about a vulnerable application
1
In the Norton Internet Security main window, click
Advanced.
2
In the NetworkProtection pane, click Vulnerability
Protection.
3
In the Vulnerability Protection window, in the
Program column, click the program name for which
you want to view the details.
4
In the Program Vulnerability Details window, view
the signature details of the program.
5
If you want to view additional information about
the signature, then click the signature name.
6
After you finish viewing the vulnerability details,
in the Program Vulnerability Details window, click
Close.
7
In the VulnerabilityProtection window, click Close.
About the types of security risks
Security risks, such as spyware and adware, can
compromise your personal information and privacy.
Spyware and adware programs are closely related. In
some cases, their functionalities might overlap; but
while they both collect information about you, the types
of information that they collect can differ.
Spyware programs might put you at risk for identity
theft or fraud. These programs might log your
keystrokes, capture your email and instant messaging
traffic. These programs also steal sensitive personal
information such as passwords, login IDs, or credit
card numbers. These programs can then send your
compromised data to other people.
Adware displays advertisements on your computer and
collects information about your Web browsing habits.
Protecting Internet activities
About the types of security risks
254










