46000 Unsolicited incoming ARP reply detected, this is a kind of MAC spoofing that may consequently do harm to your computer. \n\nPacket data is shown in the right window.
46001 Denial of Service "%1" attack detected.\nDescription:\n %2
46002 Ping of Death
46003 In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.
46006 Smurf
46007 A Smurf attack occurs when a hacker spoofs your system's IP address and then broadcasts a ping request to several subnets. The resulting deluge of ping responses ties up your system as well as the various network subnets pinged.
46008 Code Red
46009 A Code Red attack from outside is detected, it is a very dangerous virus that will deface your webpages, perform a denial-of-service attack, and even crash your system.
46010 A Code Red propagation from your computer is detected, that means your system has been infected and it is trying to infect other systems on your network.
46011 IP Fragmentation Overlap
46012 An IP Fragmentation Overlap attack exploits IP's packet reassembly feature by creating packet fragments with overlapping offset fields, making it impossible for your system to reassemble the packets properly.
46013 Jolt2 Attack
46014 Jolt2 attacker floods illegally fragmented ICMP or UDP packets into your computer and causes your CPU utilization to be 100%
46015 Land Attack
46016 Land attack involves the perpetrator sending spoofed TCP packet(s) with the SYN flag set to the victim's machine on any open port that is listening. If the packet(s) contain the same destination and source IP address as the host, the victim's machine could hang or reboot.
46017 WinNuke
46018 WinNuke exploits a big bug in old Windows 95/NT's networking system, it sends Out of Band data which old versions of Windows systems don't know how to deal with and causes the victim computer's crashing or loss of connection to Internet.
46019 Active Response from IP address %1, which started at %2, was cancelled by the user.
46020 Active Response cancel request by user for traffic from IP %1 was ignored because that IP is nolonger being blocked.
46021 Traffic from IP address %1 is blocked from %2 to %3.\n
46022 Active Response which started at %1 is disengaged. The traffic from IP address %2 was blocked for %3