Maxi
17-04-2012, 10:27
bir program indirdim
fakat 2 dosyada 2 farklı trojan - mırojan problem var
bunlar ne kadar zararlıdır ?
norton siliyor bunları direk
1-
WS.Reputation.1
Type: Other
Risk Impact: High
WS.Reputation.1 is a detection for files that have a low reputation score based on analyzing data from Symantec’s community of users and therefore are likely to be security risks. Detections of this type are based on Symantec’s reputation-based security technology. Because this detection is based on a reputation score, it does not represent a specific class of threat like adware or spyware, but instead applies to all threat categories.
2-
Trojan.Gen.2
Type: Trojan
Risk Level 1: Very Low
Trojan.Gen.2 is a generic detection for many individual but varied Trojans for which specific definitions have not been created. A generic detection is used because it protects against many Trojans that share similar characteristics.
Trojan horse programs pose as legitimate programs or files that users may recognize and want to use. They rely on this trick to lure a user into inadvertently running the Trojan. Often a Trojan will mimic a well known legitimate file name or pose as a particular type of file, like a .jpg or .doc file to trick a user.
fakat 2 dosyada 2 farklı trojan - mırojan problem var
bunlar ne kadar zararlıdır ?
norton siliyor bunları direk
1-
WS.Reputation.1
Type: Other
Risk Impact: High
WS.Reputation.1 is a detection for files that have a low reputation score based on analyzing data from Symantec’s community of users and therefore are likely to be security risks. Detections of this type are based on Symantec’s reputation-based security technology. Because this detection is based on a reputation score, it does not represent a specific class of threat like adware or spyware, but instead applies to all threat categories.
2-
Trojan.Gen.2
Type: Trojan
Risk Level 1: Very Low
Trojan.Gen.2 is a generic detection for many individual but varied Trojans for which specific definitions have not been created. A generic detection is used because it protects against many Trojans that share similar characteristics.
Trojan horse programs pose as legitimate programs or files that users may recognize and want to use. They rely on this trick to lure a user into inadvertently running the Trojan. Often a Trojan will mimic a well known legitimate file name or pose as a particular type of file, like a .jpg or .doc file to trick a user.