1 ESET 词汇表介绍 1 ...............................................................................................................................
1.1 广告软件 1 .....................................................................................................................................
1.2 僵尸网络 1 .....................................................................................................................................
1.3 误报 (FP) 1 ....................................................................................................................................
1.4 加壳程序 1 .....................................................................................................................................
1.5 潜在的不安全应用程序 2 ....................................................................................................................
1.6 潜在不受欢迎的应用程序 2 .................................................................................................................
1.7 勒索软件 5 .....................................................................................................................................
1.8 Rootkit 6 ......................................................................................................................................
1.9 面向返回的编程 6 .............................................................................................................................
1.10 间谍软件 6 ....................................................................................................................................
1.11 木马 7 .........................................................................................................................................
1.12 病毒 7 .........................................................................................................................................
1.13 蠕虫 7 .........................................................................................................................................
1.14 凭据填充 8 ....................................................................................................................................
1.15 DNS 投毒 8 ..................................................................................................................................
1.16 DoS 攻击 8 ...................................................................................................................................
1.17 ICMP 攻击 8 .................................................................................................................................
1.18 端口扫描 8 ....................................................................................................................................
1.19 SMB 中继 9 ..................................................................................................................................
1.20 TCP 去同步化 9 .............................................................................................................................
1.21 蠕虫攻击 9 ....................................................................................................................................
1.22 ARP 缓存投毒 9 .............................................................................................................................
2 电子邮件威胁 10 ..................................................................................................................................
2.1 广告 10 .........................................................................................................................................
2.2 恶作剧 10 ......................................................................................................................................
2.3 欺诈 11 .........................................................................................................................................
2.4 识别垃圾邮件欺骗 11 ........................................................................................................................
2.4 规则 11 ...................................................................................................................................
2.4 白名单 12 ................................................................................................................................
2.4 黑名单 12 ................................................................................................................................
2.4 例外 12 ...................................................................................................................................
2.4 服务器端控制 12 .........................................................................................................................
2.5 高级内存扫描程序 12 ........................................................................................................................
2.6 银行业务和付款保护 13 .....................................................................................................................
2.7 僵尸网络防护 13 .............................................................................................................................
2.8 DNA 检测 13 ..................................................................................................................................
2.9 ESET LiveGrid® 14 ........................................................................................................................
2.10 漏洞利用阻止程序 14 ......................................................................................................................
2.11 Java 漏洞利用阻止程序 14 ...............................................................................................................
2.12 ESET LiveSense 15 ......................................................................................................................
2.13 机器学习 15 ..................................................................................................................................
2.14 网络攻击防护 16 ............................................................................................................................
2.15 勒索软件防护 16 ............................................................................................................................
2.16 基于脚本的攻击防护 16 ....................................................................................................................
2.17 安全的浏览器 16 ............................................................................................................................
2.18 UEFI 扫描程序 17 ..........................................................................................................................
2.19 Canary 文件 17 ............................................................................................................................
2.20 死锁 17 .......................................................................................................................................