Computer viruses, logic bombs
, Trojan horses and worms: A computer virus can be implanted in an exchange and spread to exchange members.
It also identifies any logic bombs
hidden in the malware waiting for a trigger to cause damage at a later time.
Companies regularly spend thousands of dollars on technology products in an effort to stop intruders and malicious software such as viruses, trojan horses, worms, logic bombs
and other harmful computer code from entering their corporate network.
Other destructive computer codes include the Trojan horse (which is a code that looks harmless but can cause problems once it gets into a system), logic bombs
(which typically are the destructive codes embedded in vir-uses) and worms, which are much like viruses but have their own engines.
Many routinely make backup copies of their files every night to protect against logic bombs
that might erase data.
Using a combination of traditional and proprietary heuristic "seek-and-destroy" techniques to ferret out even the stealthiest viruses, trojans, and logic bombs
, these utilities offer an enhanced level of anti-virus protection at speeds that are unsurpassed in the PC arena.