A remote administration utility that bypasses normal security mechanisms to secretly control a program, computer or network.
Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
Detailed instructions for F-Secure security products are available in the documentation found in the Downloads section of our Home - Global site.
You may also refer to the Knowledge Base on the F-Secure Community site for further assistance.
When searching our Virus Descriptions database for a specific program (e.g., Backdoor:W32/Example.A), you may be directed to this page if the overview below sufficiently describes the program. Alternatively, you may be directed to this page if no description matching that specific query is currently available. You can submit a sample of the suspect file to our Response Lab for further analysis via:
A bot is a malicious program that, once installed on a computer, 'ropes' the infected system into a network of similarly affected systems known as a botnet. The individual computers in a botnet may also be referred to as a bot or a zombie. A botnet can be used to perform major operations, such as launching a Denial of Service (DoS) attack on a website, sending out vast quantities of spam e-mail and so on. The botnet is under the control of an attacker, sometimes referred to as a botherder. Trojans and Worms can have bot-like capabilities.For a representative example of malware with bot capability, see: