Symantec 11022527 Computer Accessories User Manual


 
Monitors the Trojan horses or
malicious programs that inject
code into an application's
process without triggering
firewall alerts.
Code Injection
Monitors the Trojan horses and
other malicious programs that
manipulate an application's
behavior to connect to the
Internet without triggering
firewall alerts.
Window Messages
Monitors the Trojan horses and
other malicious programs that
bypass network traffic.
These programs penetrate the
Windows TCP/IP layer to send
and receive data without
triggering firewall alerts.
Direct Network Access
Monitorsthemaliciousprograms
that use the documented
interfaces that the trusted
applicationsprovidetotransmit
data outside the network
withouttriggeringfirewallalerts
Active Desktop Change
Monitorsthemaliciouskeylogger
programs that access personal
information of a user ona
particular computer by
monitoring their keystroke
activities.
Key Logger Monitor
Monitorsthemaliciousprograms
thatmanipulateanapplication's
behavior by instantiating
controlled COM objects.
COM Control
Customizing settings
About Firewall settings
514