{"id":1038,"date":"2019-09-13T11:20:48","date_gmt":"2019-09-13T05:50:48","guid":{"rendered":"https:\/\/www.protegent360.com\/blog\/?p=1038"},"modified":"2023-01-31T11:32:43","modified_gmt":"2023-01-31T06:02:43","slug":"antivirus-glossary","status":"publish","type":"post","link":"https:\/\/protegent360.com\/blog\/antivirus-glossary\/","title":{"rendered":"Antivirus Glossary"},"content":{"rendered":"<p>Antivirus software is a program type or tool that has been designed and developed for protecting the computers from Adware, viruses, Brute Force Attack, Malware, Cryptojacking, Keyloggers, DDoS, Trojans, Spywares, botnets, rootkits and so on.<\/p>\n<p>The main functioning of an antivirus software is linked with the scanning, detecting and removing the viruses from computer.<\/p>\n<h3><strong>Adware <\/strong><\/h3>\n<p>Adware is a type of malware which displays unwanted advertisements and tracks browsing behaviour while the program is running. These unwanted applications can disguise itself as a legitimate program to trick into installing harmful programs on your system and can collect personal information without the user\u2019s permission.<\/p>\n<h3><strong>Brute Force Attack<\/strong><\/h3>\n<p>A brute force attack is an attempt to crack a password or keys by making repetitive attempts. This is performed on a trial and error method to fetch the required information.<\/p>\n<h3><strong>Cryptojacking<\/strong><\/h3>\n<p>The fraudulent practice by someone to mine the cryptocurrencies is Cryptojacking. Here, hackers steal computing resources from the victim\u2019s device and operate complex crypto mining operations without any overhead investment.<\/p>\n<h3><strong>DDoS<\/strong><\/h3>\n<p>A distributed denial-of-service (DDoS) attack is a malicious attempt in which multiple compromised computer systems attack a target to disrupt normal traffic of a targeted server, service or network with a flood of Internet traffic.<\/p>\n<h3><strong>Keyloggers<\/strong><\/h3>\n<p>A type of surveillance software that tracks everything a user types, including usernames and passwords. Keyloggers are often part of malware or spyware.<\/p>\n<h3><strong>Logic Bomb<\/strong><\/h3>\n<p>A Logic Bomb is a string of malicious code used to cause harm to a network when the programmed conditions are met. It is timed to cause harm at a certain point in time but is inactive up until that point. Once activated, a logic bomb implements a malicious code that causes harm to a computer<\/p>\n<h3><strong>Malware<\/strong><\/h3>\n<p>Malware is a written code with the intention to disrupt or manipulate systems and devices. Malware can be delivered in different forms and types depending on the nature and intention of the attacker. The common types of malware are viruses, ransomware, spyware, worms and Trojan horses.<\/p>\n<h3><strong>Pharming<\/strong><\/h3>\n<p>Pharming refers to manipulate website traffic through hacking which redirects a search to a fake website. Here, hackers create an impostor site, which may look exactly like the real site and prompt users to land on this illegitimate website to steal confidential information,<\/p>\n<h3><strong>Phishing<\/strong><\/h3>\n<p>A phishing attack is an attempt to let the victim share the personal or financial details with the attacker. It is basically done via emails, text messages, voice calls and malicious links within websites, emails or ads.<\/p>\n<h3><strong>Ransomware<\/strong><\/h3>\n<p>Ransomware is a type of malware which blocks or restricts the user from accessing their files\/folders on a computer or in some cases it blocks the user access to the whole network. Paying ransom to the attackers becomes the only way to get access back.<\/p>\n<h3><strong>Rootkit<\/strong><\/h3>\n<p>A rootkit is a malicious program which is used to gain administrator-level access to a targeted system. It is installed by exploiting the system vulnerabilities without the consent of the user.<\/p>\n<h3><strong>Remote Access Trojan (RAT)<\/strong><\/h3>\n<p>A remote access Trojan (RAT) is basically a dangerous malware program which usually takes a back door channel to get into your system and takes all the administrative control over it. This also leads to the compromising of your system along with the files, folders and other important documents.<\/p>\n<h3><strong>Spear Phishing<\/strong><\/h3>\n<p>Spear-phishing attack is an attempt to get the required information from the specifically targeted victim. Here, the attack is limited to an individual or a very small group of related people to steal confidential information.<\/p>\n<h3><strong>Spyware<\/strong><\/h3>\n<p>Spyware is malicious malware which infects the system, Smartphone or any other device and gathers information. Spyware enters the system without the knowledge of the user as a legitimate program and runs quietly while collecting and tracking information.<\/p>\n<h3><strong>Trojan<\/strong><\/h3>\n<p>A trojan is a computer program which appears harmless and misrepresents as a useful program but in reality, it is malicious in nature. Trojans can create a backdoor entry into the system which can give control of your computer to the hacker to carry out malicious actions.<\/p>\n<h3><strong>Virus<\/strong><\/h3>\n<p>A computer virus is a malicious program that spread throughout the system by copying itself to another program. It self replicate itself and make changes in the boot sector, programs, applications, files and can also damage the system.<\/p>\n<h3><strong>Worm<\/strong><\/h3>\n<p>A worm is a type of malicious software program that replicates while moving across computers and leaving copies of itself in the memory of each computer in its path while remaining active on infected systems.<\/p>\n<h3><strong>Zero-day<\/strong><\/h3>\n<p>Zero-day is a flaw in software that is yet unknown to the software vendor. Although this vulnerability is known to the code attackers, who use it to take advantage of this said unpatched security flaw.<\/p>\n<h3><strong>Zombie<\/strong><\/h3>\n<p>A computer that has been compromised and a remote attacker have an access to it. The attacker uses this computer to forward transmission to other computers on the internet. Attackers typically exploit multiple computers to create a botnet, also known as a zombie army.<\/p>\n<hr \/>\n<p><span style=\"color: #0000ff;\"><strong>You can download your antivirus software here:<\/strong><\/span><\/p>\n<ul>\n<li><strong><a href=\"https:\/\/protegent360.com\/antivirus\/\">Protegent antivirus<\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/protegent360.com\/total-security\/\">Protegent Total security Antivirus<\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/protegent360.com\/complete-security\/\">Protegent 360 Complete Security Antivirus Solution<\/a><\/strong><\/li>\n<\/ul>\n<p>Stay safe. Stay home.<\/p>\n<h4><strong>Follow us on:-<\/strong><\/h4>\n<p><a href=\"https:\/\/protegent360.com\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-13\" src=\"http:\/\/protegent360.com\/wp-content\/uploads\/2022\/06\/logo.png\" alt=\"\" width=\"148\" height=\"32\" \/><\/a> \u00a0<a href=\"https:\/\/twitter.com\/UnistalGlobal\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11066\" src=\"http:\/\/protegent360.com\/wp-content\/uploads\/2020\/09\/twitter-icon-circle-blue-logo-0902F48837-seeklogo.com_-300x300.png\" alt=\"\" width=\"36\" height=\"36\" srcset=\"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/twitter-icon-circle-blue-logo-0902F48837-seeklogo.com_.png 300w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/twitter-icon-circle-blue-logo-0902F48837-seeklogo.com_-150x150.png 150w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/twitter-icon-circle-blue-logo-0902F48837-seeklogo.com_-200x200.png 200w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/twitter-icon-circle-blue-logo-0902F48837-seeklogo.com_-50x50.png 50w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/twitter-icon-circle-blue-logo-0902F48837-seeklogo.com_-100x100.png 100w\" sizes=\"auto, (max-width: 36px) 100vw, 36px\" \/><\/a>\u00a0\u00a0 <a href=\"https:\/\/www.linkedin.com\/company\/unistal-systems-pvt-ltd\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11067\" src=\"http:\/\/protegent360.com\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-300x300.png\" alt=\"\" width=\"36\" height=\"36\" srcset=\"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-300x300.png 300w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-150x150.png 150w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-550x550.png 550w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-600x600.png 600w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-200x200.png 200w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-50x50.png 50w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-100x100.png 100w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials.png 640w\" sizes=\"auto, (max-width: 36px) 100vw, 36px\" \/><\/a>\u00a0\u00a0 <a href=\"https:\/\/www.instagram.com\/unistalglobal\/?hl=en\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11068\" src=\"http:\/\/protegent360.com\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-300x300.png\" alt=\"\" width=\"35\" height=\"35\" srcset=\"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-300x300.png 300w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-1024x1024.png 1024w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-150x150.png 150w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-768x768.png 768w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-1536x1536.png 1536w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-550x550.png 550w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-600x600.png 600w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-200x200.png 200w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-50x50.png 50w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-100x100.png 100w\" sizes=\"auto, (max-width: 35px) 100vw, 35px\" \/><\/a>\u00a0\u00a0 <a href=\"https:\/\/www.facebook.com\/UnistalGlobal\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11069\" src=\"http:\/\/protegent360.com\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-300x300.png\" alt=\"\" width=\"35\" height=\"35\" srcset=\"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-300x300.png 300w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-150x150.png 150w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-768x768.png 768w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-550x550.png 550w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-600x600.png 600w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-200x200.png 200w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-50x50.png 50w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-100x100.png 100w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019.png 800w\" sizes=\"auto, (max-width: 35px) 100vw, 35px\" \/><\/a>\u00a0\u00a0 <a href=\"https:\/\/www.youtube.com\/c\/UnistalGlobal\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11070\" src=\"http:\/\/protegent360.com\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb-300x300.png\" alt=\"\" width=\"37\" height=\"37\" srcset=\"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb-300x300.png 300w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb-150x150.png 150w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb-200x200.png 200w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb-50x50.png 50w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb-100x100.png 100w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb.png 512w\" sizes=\"auto, (max-width: 37px) 100vw, 37px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Antivirus software is a program type or tool that has been designed and developed for protecting the computers from Adware, viruses, Brute Force Attack, Malware, Cryptojacking, Keyloggers, DDoS, Trojans, Spywares, botnets, rootkits and so on. The main functioning of an antivirus software is linked with the scanning, detecting and removing the viruses from computer. Adware Adware is a type of malware which displays unwanted advertisements and tracks browsing behaviour while the program is running. These unwanted applications can disguise itself as a legitimate program to trick into installing harmful programs on your system and can collect personal information without the user\u2019s permission. Brute Force Attack A brute force attack is an attempt to crack a password or keys by making repetitive attempts. This is performed on a trial and error method to fetch the required information. Cryptojacking The fraudulent practice by someone to mine the cryptocurrencies is Cryptojacking. Here, hackers [&hellip;]<\/p>\n","protected":false},"author":34,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[103],"tags":[318,319,320,112,321,322,323,324,325,326,157,327,328,329,330,331,332,333,334,335,336],"class_list":["post-1038","post","type-post","status-publish","format-standard","hentry","category-antivirus-software-2","tag-adware","tag-antivirus-glossary","tag-brute-force-attack","tag-cryptojacking","tag-ddos","tag-keyloggers","tag-logic-bomb","tag-malware","tag-pharming","tag-phishing","tag-ransomware","tag-rat","tag-remote-access-trojan","tag-rootkit","tag-spear-phishing","tag-spyware","tag-trojan","tag-virus","tag-worm","tag-zero-day","tag-zombie"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Antivirus Glossary - Our Blog<\/title>\n<meta name=\"description\" content=\"Antivirus Protection against - Adware, viruses, Brute Force Attack, Malware, Cryptojacking, Keyloggers, DDoS, Trojans, Spywares and so on.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/protegent360.com\/blog\/antivirus-glossary\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Antivirus Glossary - Our Blog\" \/>\n<meta property=\"og:description\" content=\"Antivirus Protection against - Adware, viruses, Brute Force Attack, Malware, Cryptojacking, Keyloggers, DDoS, Trojans, Spywares and so on.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/protegent360.com\/blog\/antivirus-glossary\/\" \/>\n<meta property=\"og:site_name\" content=\"Our Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/UnistalGlobal\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-13T05:50:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-31T06:02:43+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/protegent360.com\/wp-content\/uploads\/2022\/06\/logo.png\" \/>\n<meta name=\"author\" content=\"Survi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/UnistalGlobal\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Survi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/protegent360.com\/blog\/#website\",\"url\":\"https:\/\/protegent360.com\/blog\/\",\"name\":\"Our Blog\",\"description\":\"World&#039;s Only Antivirus with Data Recovery Software\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/protegent360.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/protegent360.com\/blog\/antivirus-glossary\/\",\"url\":\"https:\/\/protegent360.com\/blog\/antivirus-glossary\/\",\"name\":\"Antivirus Glossary - Our Blog\",\"isPartOf\":{\"@id\":\"https:\/\/protegent360.com\/blog\/#website\"},\"datePublished\":\"2019-09-13T05:50:48+00:00\",\"dateModified\":\"2023-01-31T06:02:43+00:00\",\"author\":{\"@id\":\"https:\/\/protegent360.com\/blog\/#\/schema\/person\/20de76dd45afab8021b34158191d77c7\"},\"description\":\"Antivirus Protection against - Adware, viruses, Brute Force Attack, Malware, Cryptojacking, Keyloggers, DDoS, Trojans, Spywares and so on.\",\"breadcrumb\":{\"@id\":\"https:\/\/protegent360.com\/blog\/antivirus-glossary\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/protegent360.com\/blog\/antivirus-glossary\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/protegent360.com\/blog\/antivirus-glossary\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/protegent360.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Antivirus Glossary\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/protegent360.com\/blog\/#\/schema\/person\/20de76dd45afab8021b34158191d77c7\",\"name\":\"Survi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/protegent360.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/dbc58f88815822bcca0eed40f57479befac47a388a2e89d7f40adf29cfaf494b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/dbc58f88815822bcca0eed40f57479befac47a388a2e89d7f40adf29cfaf494b?s=96&d=mm&r=g\",\"caption\":\"Survi\"},\"sameAs\":[\"https:\/\/protegent360.com\/\",\"https:\/\/www.facebook.com\/UnistalGlobal\",\"https:\/\/www.linkedin.com\/company\/unistal-systems-pvt-ltd\",\"https:\/\/twitter.com\/https:\/\/twitter.com\/UnistalGlobal\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Antivirus Glossary - Our Blog","description":"Antivirus Protection against - Adware, viruses, Brute Force Attack, Malware, Cryptojacking, Keyloggers, DDoS, Trojans, Spywares and so on.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/protegent360.com\/blog\/antivirus-glossary\/","og_locale":"en_US","og_type":"article","og_title":"Antivirus Glossary - Our Blog","og_description":"Antivirus Protection against - Adware, viruses, Brute Force Attack, Malware, Cryptojacking, Keyloggers, DDoS, Trojans, Spywares and so on.","og_url":"https:\/\/protegent360.com\/blog\/antivirus-glossary\/","og_site_name":"Our Blog","article_author":"https:\/\/www.facebook.com\/UnistalGlobal","article_published_time":"2019-09-13T05:50:48+00:00","article_modified_time":"2023-01-31T06:02:43+00:00","og_image":[{"url":"http:\/\/protegent360.com\/wp-content\/uploads\/2022\/06\/logo.png"}],"author":"Survi","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/UnistalGlobal","twitter_misc":{"Written by":"Survi","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/protegent360.com\/blog\/#website","url":"https:\/\/protegent360.com\/blog\/","name":"Our Blog","description":"World&#039;s Only Antivirus with Data Recovery Software","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/protegent360.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/protegent360.com\/blog\/antivirus-glossary\/","url":"https:\/\/protegent360.com\/blog\/antivirus-glossary\/","name":"Antivirus Glossary - Our Blog","isPartOf":{"@id":"https:\/\/protegent360.com\/blog\/#website"},"datePublished":"2019-09-13T05:50:48+00:00","dateModified":"2023-01-31T06:02:43+00:00","author":{"@id":"https:\/\/protegent360.com\/blog\/#\/schema\/person\/20de76dd45afab8021b34158191d77c7"},"description":"Antivirus Protection against - Adware, viruses, Brute Force Attack, Malware, Cryptojacking, Keyloggers, DDoS, Trojans, Spywares and so on.","breadcrumb":{"@id":"https:\/\/protegent360.com\/blog\/antivirus-glossary\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/protegent360.com\/blog\/antivirus-glossary\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/protegent360.com\/blog\/antivirus-glossary\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/protegent360.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Antivirus Glossary"}]},{"@type":"Person","@id":"https:\/\/protegent360.com\/blog\/#\/schema\/person\/20de76dd45afab8021b34158191d77c7","name":"Survi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/protegent360.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/dbc58f88815822bcca0eed40f57479befac47a388a2e89d7f40adf29cfaf494b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/dbc58f88815822bcca0eed40f57479befac47a388a2e89d7f40adf29cfaf494b?s=96&d=mm&r=g","caption":"Survi"},"sameAs":["https:\/\/protegent360.com\/","https:\/\/www.facebook.com\/UnistalGlobal","https:\/\/www.linkedin.com\/company\/unistal-systems-pvt-ltd","https:\/\/twitter.com\/https:\/\/twitter.com\/UnistalGlobal"]}]}},"_links":{"self":[{"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/posts\/1038","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/comments?post=1038"}],"version-history":[{"count":1,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/posts\/1038\/revisions"}],"predecessor-version":[{"id":11977,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/posts\/1038\/revisions\/11977"}],"wp:attachment":[{"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/media?parent=1038"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/categories?post=1038"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/tags?post=1038"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}