02-07-2012 12:23 AM - edited 02-07-2012 12:30 AM
as above. Thanks.
Solved! Go to Solution.
02-07-2012 12:52 AM - edited 02-07-2012 12:54 AM
Vulnerability Protection Add-on in your browser does behaves as a protection shield from threats which attacks the browsers.
These attacks may stop browsers from behaving in a normal way.
02-07-2012 01:09 AM
Vulnerability Protection is a component of Intrusion Prevention System. Vulnerability Protection provides information about the susceptibility of the programs that may be on your computer against malicious attacks. It also provides information about the known attacks that they are protected from.
Vulnerabilities are flaws in your programs or your operating system that can create weaknesses in overall security of your system. Improper computer configurations or security configurations also create vulnerabilities. External attackers exploit these vulnerabilities and perform malicious actions on your computer. Examples of such malicious attacks are active desktop monitoring, keylogging, and hacking. Such attacks can slow down the performance of your computer, cause program failure, or expose your personal data and confidential information to the hackers.
Norton provides the signature-based solutions to protect your computer from the most common Internet attacks. Attack signatures contain the information that identifies an attacker's attempt to exploit a known vulnerability in your operating system or your computer programs. The Intrusion Prevention feature of Norton Security Products uses an extensive list of attack signatures to detect and block suspicious network activity.
Vulnerability Protection lets you view the correlation between the vulnerabilities that your computer is protected against and the programs that may contain these vulnerabilities.
For example, if Internet Explorer does not handle certain HTTP responses, it can result in a vulnerability that can be exploited. In this case, Vulnerability Protection lists Internet Explorer as a vulnerable program. It also provides details about the signatures that Intrusion Prevention uses to detect any attempt to exploit this vulnerability.
02-09-2012 05:16 AM
Thank you! I suppose now I should have a better understanding about the software.
02-10-2012 02:38 AM
Vulnerability Protection Protects your computer by covering the vulnerabilities(weakness) Present in the Softwares installed in your computer. It's like a Bullet Proof to the softwares installed in your Computer.