20.08.2013 Views

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Protection against network attacks 165<br />

(MS05-011) Microsoft Windows SMB Client Transaction Response<br />

Handling<br />

(MS05-017) Microsoft Windows Message Queuing Buffer Overflow<br />

Vulnerability<br />

(MS05-039) Microsoft Windows Plug-and-Play Service Remote Overflow<br />

(MS04-045) Microsoft Windows Internet Naming Service (WINS) Remote<br />

Heap Overflow<br />

(MS05-051) Microsoft Windows Distributed Transaction Coordinator<br />

Memory Modification<br />

In addition, there are isolated incidents of intrusion attacks using various<br />

malicious scripts, including scripts processed by Microsoft Internet<br />

Explorer and Helkern-type worms. The essence of this attack type<br />

consists of sending a special type of UDP packets to a remote computer<br />

that can execute malicious code.<br />

Remember that, while connected to the network, your computer is at constant<br />

risk of being attacked by a hacker. To ensure your computer's security, be sure<br />

to enable Firewall when using the Internet and regularly update application<br />

databases (see 17.3.2 on pg. 227).<br />

12.3. Blocking and allowing network<br />

activity<br />

If the security level for the Firewall is set to Training Mode, a special notice<br />

appears on screen each time a network connection is attempted that has no rule.<br />

For example, after opening Microsoft Office Outlook, it downloads your email<br />

from a remote Exchange server. To display your Inbox, the program connects to<br />

the email server. Firewall always tracks this kind of network activity. A message<br />

will appear on the screen (see Figure 58) containing:<br />

• Description of activity – name of the application and a brief description of<br />

the connection that it is initiating, generally including the connection type,<br />

the local port from which it is being initiated, the remote port, and the<br />

address being connected to. Left click anywhere in the area to obtain<br />

detailed information on the connection, its initiating process, and the<br />

application distributor.<br />

• Action – series of operations that Firewall will perform regarding the<br />

network activity detected.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!