Access macro viruses that are native to Access 2000.
Access macro viruses that are native to Access 97.
Access macro viruses that are native to Access 95.
Trojan horses that are specific to America Online environments and usually steal AOL password information
Batch file threats.
Threats may allow unauthorized users to access your computer across the Internet.
Bloodhound is the name of the Norton AntiVirus heuristic scanning technology for detecting new and unknown viruses
Distributed Denial of Service threats. Distributed Denial of Service involves using zombie computers in an attempt to flood an Internet site with traffic.
Denial of Service threats. Not to be confused with DOS viruses, which are named without prefixes.
High Level Language Companion viruses. These are usually DOS viruses that create an additional file (the companion) to spread.
High Level Language Overwriting viruses. These are usually DOS viruses that overwrite host files with viral code.
High Level Language Parasitic viruses. These are usually DOS viruses that attach themselves to host files.
A worm that is compiled using a High Level Language. (NOTE: This modifier is not always a prefix, it is only a prefix in the case of a DOS High Level Language Worm. If the Worm is a Win32 file, the proper name would be W32.HLLW.)
Threats that target HTML files.
Threats that target IRC applications.
Viruses that are written using the Java programming language.
Threats that target the Linux operating system.
Office 2000 macro viruses. May infect across different types of Office 2000 documents.
Office 97 macro viruses. May infect across different types of Office 97 documents.
Office macro viruses. May infect across different types of Office documents.
Trojan horses that steal passwords.
Threats that are designed to run specifically on the Palm OS.
These files are not viruses, but Trojan horses. Trojan horses are files that masquerade as helpful programs, but are actually malicious code. Trojan horses do not replicate.
Threats that run under any UNIX-based operating system.
Viruses that are written using the Visual Basic Script programming language.
Word 2000 macro viruses. These are native to Word 2000 and replicate under Word 2000 only.
32-bit Windows viruses that can infect under all 32-bit Windows platforms.
Windows 95 viruses that infect files under the Windows 95 operating system. Windows 95 viruses often work in Windows 98 also.
Word 97 macro viruses. These are native to Word 97 and replicate under Word 97 only.
Windows 98 threats that infect files under the Windows 98 operating system. Will only work in Windows 98.
Word macro viruses that replicate under Word 6.0 and Word 95 (Word 7.0). They may also replicate under Word 97 (Word 8.0), but are not native to Word 97.
32-bit Windows viruses that can infect under the Windows NT operating system.
Windows 3.x viruses that infect files under the Windows 3.x operating system.
Excel macro viruses that are native to Excel 2000.
Excel macro viruses that are native to Excel 97. These viruses may replicate under Excel 5.0 and Excel 95 as well.
Excel formula viruses are viruses using old Excel 4.0 embedded sheets within newer Excel documents.
Excel macro viruses that are native to Excel 5.0 and Excel 95. These viruses may replicate in Excel 97 as well.
Signifies the virus or worm is a mailer. An example is Happy99 (W32.Ska), which only sends itself by email when you (the user) send mail.
Signifies the virus or worm is a mass-mailer. An example is Melissa, which sends messages to every email address in your mailbox.
Indicates a detection for files that have been corrupted by a threat, or that may contain inactive remnants of a threat, causing the files to no longer be able to execute properly or produce reliable results.
Indicates that the detected file is a dropper for another threat.
Indicates a generic detection for threats that belong to a particular threat family based on viral characteristics.
Indicates a generic detection for threats that belong to a particular threat type based on viral characteristics.
Indicates an intended threat. Threats that are intended to spread, but don't due to bugs or errors in the viral code.
Indicates a worm, not a virus. Worms make copies of themselves that they send across a network or using email, or another transport mechanism