Application Control Application Control

Browse the Fortiguard Labs extensive encyclopedia of applications. Click any title to view more details of the application. Can't find what you are looking for? Try using the search bar above to find a specific application description.

This indicates an attempt to access Tribe Flood Network (TFN). Tribe Flood Network (TFN) is a distributed denial of service tool....

Dec 09, 2008 RISK: POPULARITY:
This indicates an attempt to use the ZMAAP protocol.Zeroconf Multicast Address Allocation Protocol (ZMAAP) is a protocol that...

Dec 09, 2008 RISK: POPULARITY:
This indicates an attempt to access Helix DNA.Helix DNA is a client-server software that can play both audio and video media and...

Dec 01, 2008 RISK: POPULARITY:
This indicates an attempt to access a SAP MaxDB database. SAP MaxDB is the database management system developed by SAP AG. It...

Dec 01, 2008 RISK: POPULARITY:
This indicates detection of network traffic originating from a computer infected with the Krackin version of the Storm worm.The...

Oct 23, 2007 RISK: POPULARITY:
It indicates that the system might be infected by the Agobot/Phatbot trojan.This backdoor trojan is known to:1) scan local networks...

Sep 11, 2006 RISK: POPULARITY:
This indicates an attempt to use the Direct Connect protocol. Direct Connect is a peer-to-peer network that can be used for internet...

Sep 11, 2006 RISK: POPULARITY:
This indicates detection of data traffic from a Gnutella application.Gnutella is a popular peer-to-peer (P2P) file-sharing protocol....

Sep 11, 2006 RISK: POPULARITY:
This indicates detection of data traffic from a Gnutella application.Gnutella is a popular peer-to-peer (P2P) file-sharing protocol....

Sep 11, 2006 RISK: POPULARITY:
This indicates detection of data traffic from a Kazaa application.Kazaa is a popular peer-to-peer (P2P) file-sharing program....

Sep 11, 2006 RISK: POPULARITY:
This indicates detection of data traffic from a Kazaa application.Kazaa is a popular peer-to-peer (P2P) file-sharing program....

Sep 11, 2006 RISK: POPULARITY:
It indicates that the system might be infected by the Agobot/Phatbot trojan and is making a peer-to-peer (P2P) connection. This...

Sep 11, 2006 RISK: POPULARITY:
This indicates detection of standard HTTP proxy protocol within the network. The signature will be triggered under two conditions:1....

Sep 11, 2006 RISK: POPULARITY:
This signature is written to check WinNY network traffic. WinNy is a peer-to-peer file sharing program.

Sep 11, 2006 RISK: POPULARITY:
This signature is written to check WinNY network traffic. WinNy is a peer-to-peer file sharing program.

Sep 11, 2006 RISK: POPULARITY: