upload
McAfee, Inc.
Industry: Software
Number of terms: 9143
Number of blossaries: 1
Company Profile:
This term represents an assumed or alternate name for a virus or Trojan. Some viruses are given multiple names because no central organization exists that is tasked with naming computer viruses.
Industry:Software
A series of algorithms to determine a remote host’s operating system, architecture, platform, or device type. This process may involve TCP/IP stack fingerprinting and application-layer protocol tests.
Industry:Internet
A type of virus that uses a combination of techniques, including infecting documents, executables, and boot sectors, to infect computers. Most multipartite viruses first become resident in memory and then infect the boot sector of the hard drive. Once in memory, multipartite viruses may infect the entire system. Removing multipartite viruses requires cleaning both the boot sectors and any infected files. Before you attempt the repair, you must have a clean, write-protected rescue disk.
Industry:Internet
The second Tuesday of each month, when Microsoft releases security patches.
Industry:Internet
A scanner’s action after it detects a virus, Trojan, worm, or potentially unwanted program (PUP). The cleaning action can include removing malicious code from a file and restoring the file to usability; removing references to the file from system files, system INI (. Ini) files, and the registry; ending the process generated by the file; deleting a macro or a Microsoft Visual Basic script that is infecting a file; deleting a file if it is a Trojan, worm, or belongs to a PUP; or renaming a file that it cannot clean. Clean or cleaning is also known as repair.
Industry:Internet
An attack in which the target is besieged with more traffic than it can handle, which usually results in disablement or a complete shutdown. FDoS programs are singular in form; there are no other components of the attack structure.
Industry:Internet
A Trojan application designed to produce fake anti-virus or scan alerts intended to trick the user into believing the system is infected with malware. FakeAlert applications (sometimes referred to as “FakeAV” or “Fake Anti-Virus”) may offer to clean the system for a registration fee but usually only take the user’s credit card information without making any changes or fixing the damages they caused.
Industry:Internet
The mechanism that drives the anti-virus scanning process.
Industry:Internet
A hacking technique used to cause a denial-of-service attack by sending a large ICMP packet to a target. As the target tries to reassemble the packet, the packet size overflows the buffer and can cause the target to reboot or freeze.
Industry:Internet
Prefix for PUP detections of applications that are classified as hacker tools.
Industry:Internet