Monitorsthe Trojan horses or
maliciousprograms that inject
codeinto an application's
processwithout triggering
firewallalerts.
CodeInjection
Monitorsthe Trojan horses and
othermalicious programs that
manipulatean application's
behaviorto connect to the
Internetwithout triggering
firewallalerts.
WindowMessages
Monitorsthe Trojan horses and
othermalicious programs that
bypassnetwork traffic.
Theseprograms penetrate the
WindowsTCP/IP layer to send
andreceive data without
triggeringfirewall alerts.
DirectNetwork Access
Monitorsthemalicious programs
thatuse the documented
interfacesthat the trusted
applicationsprovide to transmit
dataoutside the network
withouttriggering firewall alerts
ActiveDesktop Change
Monitorsthemalicious keylogger
programsthat access personal
informationof a user on a
particularcomputer by
monitoringtheir keystroke
activities.
KeyLogger Monitor
Monitorsthemalicious programs
thatmanipulate an application's
behaviorby instantiating
controlledCOM objects.
COMControl
Customizingsettings
AboutFirewall settings
514