1 ESET 字彙簡介 1 ...................................................................................................................................
1.1 廣告程式 1 .....................................................................................................................................
1.2 殭屍網路 1 .....................................................................................................................................
1.3 誤判 (FP) 1 ....................................................................................................................................
1.4 惡意加殼 1 .....................................................................................................................................
1.5 潛在不安全的應用程式 2 ....................................................................................................................
1.6 潛在不需要應用程式 2 .......................................................................................................................
1.7 勒索軟體 5 .....................................................................................................................................
1.8 Rootkit 6 ......................................................................................................................................
1.9 返回導向的程式設計 6 .......................................................................................................................
1.10 間諜程式 6 ....................................................................................................................................
1.11 特洛伊木馬程式 7 ...........................................................................................................................
1.12 病毒 7 .........................................................................................................................................
1.13 蠕蟲 7 .........................................................................................................................................
1.14 憑證填充 8 ....................................................................................................................................
1.15 DNS Poisoning 8 ..........................................................................................................................
1.16 DoS 攻擊 8 ...................................................................................................................................
1.17 ICMP 攻擊 8 .................................................................................................................................
1.18 連接埠掃描 8 .................................................................................................................................
1.19 SMB Relay 9 ................................................................................................................................
1.20 TCP 去同步化 9 .............................................................................................................................
1.21 蠕蟲攻擊 9 ....................................................................................................................................
1.22 ARP 快取破壞 9 .............................................................................................................................
2 電子郵件威脅 10 ..................................................................................................................................
2.1 廣告 10 .........................................................................................................................................
2.2 惡作劇 10 ......................................................................................................................................
2.3 網路釣魚 11 ...................................................................................................................................
2.4 識別垃圾郵件詐騙 11 ........................................................................................................................
2.4 規則 11 ...................................................................................................................................
2.4 白名單 12 ................................................................................................................................
2.4 黑名單 12 ................................................................................................................................
2.4 例外 12 ...................................................................................................................................
2.4 伺服器端控制 12 .........................................................................................................................
2.5 進階記憶體掃描器 13 ........................................................................................................................
2.6 銀行付款防護 13 .............................................................................................................................
2.7 殭屍網路防護 13 .............................................................................................................................
2.8 DNA 偵測 14 ..................................................................................................................................
2.9 ESET LiveGrid® 14 ........................................................................................................................
2.10 惡意探索封鎖程式 14 ......................................................................................................................
2.11 Java 惡意探索封鎖程式 15 ...............................................................................................................
2.12 ESET LiveSense 15 ......................................................................................................................
2.13 機器學習 15 ..................................................................................................................................
2.14 網路攻擊防護 16 ............................................................................................................................
2.15 勒索軟體保護 16 ............................................................................................................................
2.16 指令碼型攻擊防護 16 ......................................................................................................................
2.17 安全的瀏覽器 16 ............................................................................................................................
2.18 UEFI 掃描器 17 .............................................................................................................................
2.19 Canary 檔案 17 ............................................................................................................................
2.20 鎖死 17 .......................................................................................................................................