Symantec Norton 360 Multi-Device, 5U Manuel Page 41

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 618
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 40
Programs containing
malicious codes that are
disguised as or hiding in
something benign, such as a
game or utility.
Trojan horses
Tools that are used by a
hacker to gain unauthorized
access to your computer. One
type of hacking tool, a
keystroke logger, tracks and
records your individual
keystrokes and can send this
information back to the
hacker.
Hacking tools
Programs that can scan
systems or monitor activity
and relay the information to
other computers or locations
in cyberspace.
Spyware
Programs that facilitate the
delivery of advertising
content through their own
window, or by using another
program's interface.
Adware
41Getting Started
About Norton Bootable Recovery Tool
Vue de la page 40
1 2 ... 36 37 38 39 40 41 42 43 44 45 46 ... 617 618

Commentaires sur ces manuels

Pas de commentaire