12.0

Table Of Contents
Figure 13-1
Virus and Spyware Protection
Table 13-2 lists the known viruses and security risks that protection scans detect.
Table 13-2
Known viruses and security risks
DescriptionRisk
A computer program that attaches to another program or
document when it runs.
Virus
A program that runs automated tasks over the Internet for
malicious purposes. A bot automates attacks on a computer or
collects information from a Web site.
Malicious Internet bot
A program that replicates without infecting other programs. A
worm spreads by copying itself from disk to disk or by replicating
in memory.
Worm
A malicious program that hides itself in a benign game or utility.Trojan horse
A threat that blends the characteristics of viruses, worms, Trojan
horses, and code with server and Internet vulnerabilities to initiate,
transmit, and spread an attack.
Blended threat
Managing protection scans
How protection scans work
114