Webwasher 6.0.1 Anti-Malware User's Guide - McAfee
Webwasher 6.0.1 Anti-Malware User's Guide - McAfee
Webwasher 6.0.1 Anti-Malware User's Guide - McAfee
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Content Security<br />
4–48<br />
— Usage of vulnerable functionality<br />
This functionality is located in the host environment, e. g. the Web<br />
browser or the Java VM.<br />
• Operations primarily performed by all kinds of mobile code<br />
In this area, also select actions with regard to:<br />
— Read access to local files<br />
This includes the programmatic evaluation of (formerly obfuscated) program<br />
code.<br />
— Write access to local files<br />
This also includes locally mounted network shares.<br />
— Read access to the registry<br />
This includes operations like opening registry keys and reading registry<br />
values.<br />
— Write access to the registry<br />
This includes the creation and deletion of registry keys, as well as the<br />
modification of registry values.<br />
— Access to the network<br />
With this operation, code may be classified as potentially malicious regardless<br />
of the transport direction and application-level protocol.<br />
— Dynamic loading of program code<br />
This includes the instantiation of COM servers (as with ActiveX controls).<br />
— Dynamic creation of program code<br />
This includes the programmatic evaluation of (formerly obfuscated) program<br />
code.<br />
— Access to other processes<br />
An example of this is usage of Interprocess Communication (IPC) functionality.