Ze zeggen van wel, maar hij vraagt nooit of een programma verbinding mag maken met internet!
Plz help me!
Alvast bedankt!

Welkom op HijackThis, op dit forum kan je terecht voor gratis hulp bij het verwijderen van virussen, malware en andere schadelijke software. Als gast kan je alleen het forum bekijken en meelezen met de verschillende discussies. Klik op de onderstaande link om geheel gratis een gebruikersaccount op ons forum te registreren.
Ben je tevreden over de manier waarop onze medewerkers je geholpen hebben op HijackThis.nl? Of wil je HijackThis.nl een hart onder de riem steken om dit vrijwilligerswerk verder te kunnen blijven doen? Overweeg dan eens of je een (vrijblijvende) donatie aan ons forum kan doen. Met dank bij voorbaat voor de donatie die je aan HijackThis.nl hebt gedaan!
Zie ook: http://www.networkassociates.com/us/pro ... top/vs.htmProductsIntegrated firewall and IPS technology – Addition of firewall and intrusion prevention technology delivers maximum proactive protection in a single, integrated package
Complete outbreak response
The built-in outbreak response features in VirusScan 8.0i provide protection from new viruses before DAT files are available, enabling administrators to take action in the crucial vulnerability window that exists after a virus is identified but before a DAT has been released. Outbreak response functionality includes:
Port blocking/lockdown (firewall feature)
Allows the administrator or user to "turn off" (block) specified ports from either outbound or inbound network traffic (for example, for MyDoom port #3196 should have been blocked; Bagel.n was port #2556)
Application monitoring: email engines (firewall feature)
Allows administrators to block outbound ports, but set rules that allow certain processes to communicate through a closed port. For example, administrators could block port 25 to outbound traffic but allow outlook.exe to communicate outbound through the port. NetSky and MyDoom would not have gotten out of the system with this feature turned on.
File blocking, directory lockdown, folder/share blocking (IPS feature)
Creation of a policy (or policies) that controls the permitted actions that can occur to a specified file, directory, or folder/share (or group of files, folders, etc., with matching name pattern composed of text and wildcard symbols) by system or incoming network processes. For example, the policy for the Sasser worm would have blocked avserve*.exe, skynetave.exe, lsasss.exe, napatch.exe, *_up.exe, cmd.ftp, ftplog.txt, winlog2.*, and win*.log.
Infection trace and block
VirusScan can discover and trace the IP address of the end-point system (infection source) that sent malicious code to a system running VirusScan Enterprise 8.0i, reporting the infection source information back to the management console. Optionally, it can block further communications from the infection source end-point system for a specified time period (configurable) or indefinitely (until reset).