1 ESET Sözlüğü'ne Giriş 1 .......................................................................................................................
1.1 Reklam Yazılımı 1 ..........................................................................................................................
1.2 Botnet 1 .......................................................................................................................................
1.3 Yanlış Tespit (YP) 2 .......................................................................................................................
1.4 Paketleyici 2 .................................................................................................................................
1.5 Tehlikeli olabilecek uygulamalar 2 ..................................................................................................
1.6 İstenmeyen türden olabilecek uygulamalar 2 ...................................................................................
1.7 Fidye yazılımı 7 .............................................................................................................................
1.8 Kök seti 7 .....................................................................................................................................
1.9 İade yönlü programlama 8 ..............................................................................................................
1.10 Casus yazılım 8 ...........................................................................................................................
1.11 Truva Atı 8 ..................................................................................................................................
1.12 Virüs 9 .......................................................................................................................................
1.13 Solucan 9 ...................................................................................................................................
1.14 Kimlik bilgilerini istifleme 10 ........................................................................................................
1.15 DNS Zehirleme 10 .......................................................................................................................
1.16 DoS saldırısı 10 ...........................................................................................................................
1.17 ICMP saldırısı 10 .........................................................................................................................
1.18 Bağlantı noktası tarama 11 ..........................................................................................................
1.19 SMB Relay 11 ..............................................................................................................................
1.20 TCP eşitlemesinin bozulması 11 ....................................................................................................
1.21 Solucan saldırısı 12 .....................................................................................................................
1.22 ARP Önbellek Zehirlenmesi 12 ......................................................................................................
2 E-posta tehditleri 12 .............................................................................................................................
2.1 Reklamlar 13 ................................................................................................................................
2.2 Sahtekarlıklar 13 ..........................................................................................................................
2.3 Kimlik avı 13 ................................................................................................................................
2.4 Kimlik bilgilerini çalmaya yönelik istenmeyen postaları tanıma 14 ......................................................
2.4 Kurallar 14 ................................................................................................................................
2.4 Beyaz liste 15 .............................................................................................................................
2.4 Kara liste 15 ..............................................................................................................................
2.4 Özel Durum 15 ...........................................................................................................................
2.4 Sunucu tarafı denetimi 15 ...............................................................................................................
2.5 Gelişmiş Bellek Tarayıcı 16 .............................................................................................................
2.6 Bankacılık ve Ödeme Sistemleri Koruması 16 ...................................................................................
2.7 Botnet Koruması 17 .......................................................................................................................
2.8 DNA Algılamaları 17 ......................................................................................................................
2.9 ESET LiveGrid® 17 ........................................................................................................................
2.10 Exploit Engelleyici 18 ...................................................................................................................
2.11 Java Exploit Engelleyici 18 ............................................................................................................
2.12 ESET LiveSense 18 ......................................................................................................................
2.13 Makine Öğrenimi 19 ....................................................................................................................
2.14 Ağ Saldırısına Karşı Koruma 20 .....................................................................................................
2.15 Fidye Yazılımı Koruması 20 ...........................................................................................................
2.16 Komut Dosyası Tabanlı Saldırı Koruması 20 ....................................................................................
2.17 Güvenli Tarayıcı 20 ......................................................................................................................
2.18 UEFI Tarayıcı 21 ..........................................................................................................................
2.19 Kanarya dosyası 21 .....................................................................................................................
2.20 Kilitlenme 21 ..............................................................................................................................