home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
PC World 2007 March
/
PCWorld_2007-03_cd.bin
/
akce
/
Panda
/
IS2007.exe
/
Files
/
SA
/
TCImAlrt.dll
/
1033
/
string.txt
Wrap
Text File
|
2006-06-15
|
3KB
|
79 lines
1001 %s warning
1002 %s has detected the following threat:
1003 %s has detected the following virus in the message body:
1004 %s has detected a suspicious file:
1005 %s has detected a suspicious process:
1006 %s has detected a buffer overflow attack:
1007 %s has detected a buffer overflow:
1008 %s has detected a network virus:
1009 %s has detected an intrusion attempt and has taken the following action: %s
1010 %s has detected an attempt to violate file access control rules.
1011 %s has detected an attempt to violate Windows registry access rules.
1012 %s has detected an attempt to violate COM component access rules.
1013 %s has detected an attempt to violate Windows services access rules.
1014 %s has detected an unauthorized communication attempt that violates rules for accessing network resources.
1015 %s has detected an attempt to violate a user account access control rule.
1016 %s has detected that your computer does not meet the security restrictions and access has been denied to the following computer:
1017 %s has detected a phishing attempt in the message body:
2000 Virus.
2001 Spyware
2002 Hacking tool
2003 Security risk
2004 Dialer
2005 Joke
2006 Hoax
2007 Adware
2008 Spyware (Tracking cookie)
2009 Potentially unwanted application
2010 Suspicious
3000 Type
3001 Name
3002 COMPUTER
3003 LOCATION
3004 RESULTS
3005 MESSAGE SUBJECT
3006 DATE OF MESSAGE
3007 DATE
3008 File
3009 PROCESS ATTACKED
3010 KEY
3011 COMPONENT
3012 SERVICE
3013 USER ACCOUNT
4000 Disinfected
4001 Deleted
4002 Blocked
4003 Renamed
4004 Moved to quarantine
4005 Notified
4006 Process closed
4007 Aborted intrusion attempt
4008 Access denied
5000 Block port scanning
5001 Block IP spoofing attacks
5002 Block MAC spoofing attacks
5003 Block DoS attacks
5004 Block packets with incorrect SYN, ACK and FIN combinations
5005 Prevent the use of custom protocol drivers
5006 Block all unsolicited DHCP, DNS and WINS responses
5007 Block all unsolicited ICMP responses
5008 Block packets with explicit route description in the IP header
5009 Prevent the identification of the operating system
5010 Block packets with inconsistent fragments
5011 Block IP/TCP/UDP packets with inconsistent data in headers
5012 Block protocols other than TCP, UDP and ICMP
5013 Deny Ping Echo Retry
5014 Block packets with invalid TCP flag combinations
5015 Block LSSR attacks
5016 Block packets with the same source and destination IP (LAND attacks)
5017 Block fragmentation attacks
6000 The application %s has tried to access a protected file.
6001 The application %s has tried to take unauthorized action on a registry entry.
6002 The application %s has tried to take unauthorized action on a COM component.
6003 The application %s has tried to take unauthorized action on a Windows service.
6004 An unauthorized communication attempt has been detected that violates a network resource access rule.
6005 An attempt to violate privileges on a restricted user account has been detected
7000 %s drive boot sector
8000 :
9005 DD/MM/YYYY hh:mm