12.0

Table Of Contents
Table 13-2
Known viruses and security risks (continued)
DescriptionRisk
A program that secretly gathers personal information through
the Internet and relays it back to another computer. An adware
program is unknowingly downloaded from a Web site. It can arrive
through an email message or instant messenger program.
Adware
A program that uses a computer, without the user's permission
or knowledge, to dial through the Internet to a 900 number or an
FTP site.
Dialer
A program that is used to gain unauthorized access to a user's
computer. For example, a keystroke logger tracks and records
individual keystrokes.
Hacking tool
A program that alters or interrupts the operation of a computer
in a way that is intended to be humorous or frightening.
Joke program
A program that secretly monitors system activity, and detects
passwords and other confidential information.
Spyware
A program that allows access over the Internet from another
computer, to gain information or to attack or alter a user's
computer.
Remote access
program
A program that traces a user's path on the Internet.Trackware
About the types of protection scans
Table 13-3 lists the types of protection scans.
115Managing protection scans
How protection scans work