Application Control Application Control

Browse the Fortiguard Labs extensive encyclopedia of applications. Click any title to view more details of the application. Can't find what you are looking for? Try using the search bar above to find a specific application description.

This indicates an attempt to send a dynamic update request via DNS.DNS dynamic update allows administrators to register an...

Sep 11, 2006 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to access QQ Instant Messenger.QQ, also known as Tencent QQ, is an IM software developed by Tenc...

Sep 11, 2006 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to access QQ Instant Messenger.QQ, also known as Tencent QQ, is an IM software developed by Tenc...

Sep 11, 2006 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates the presence of a growingly popular peer-to-peer (P2P) Voice-over-IP (VoIP) application, known as Skype, in...

Sep 11, 2006 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates the presence of a growingly popular peer-to-peer (P2P) Voice-over-IP (VoIP) application, known as Skype, in...

Sep 11, 2006 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates the presence of a growingly popular peer-to-peer (P2P) Voice-over-IP (VoIP) application, known as Skype, in...

Sep 11, 2006 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to access WinMX.WinMX is a peer-to-peer file sharing application. It was created by Frontcode Te...

Apr 07, 2006 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to access WinMX.WinMX is a peer-to-peer file sharing application. It was created by Frontcode Te...

Apr 07, 2006 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to access streamed media over the Internet.Stream media protocols include MMS, RTSP and HTTP.

Mar 20, 2006 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to access streamed media over the Internet.Stream media protocols include MMS, RTSP and HTTP.

Mar 20, 2006 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to access streamed media over the Internet.Stream media protocols include MMS, RTSP and HTTP.

Mar 20, 2006 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to access streamed media over the Internet.Stream media protocols include MMS, RTSP and HTTP.

Mar 20, 2006 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to access streamed media over the Internet.Stream media protocols include MMS, RTSP and HTTP.

Mar 20, 2006 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to access streamed media over the Internet.Stream media protocols include MMS, RTSP and HTTP.

Mar 20, 2006 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to access streamed media over the Internet.Stream media protocols include MMS, RTSP and HTTP.

Mar 20, 2006 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to use the ICY protocol.The ICY protocol is a superset of the HTTP protocol. It is a protocol de...

Nov 28, 2005 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to use the ICY protocol.The ICY protocol is a superset of the HTTP protocol. It is a protocol de...

Nov 28, 2005 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to use the ICY protocol.The ICY protocol is a superset of the HTTP protocol. It is a protocol de...

Nov 28, 2005 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to use the ICY protocol.The ICY protocol is a superset of the HTTP protocol. It is a protocol de...

Nov 28, 2005 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo
This indicates an attempt to use the ICY protocol.The ICY protocol is a superset of the HTTP protocol. It is a protocol de...

Nov 28, 2005 RISK: light-circle-logo light-circle-logo light-circle-logo light-circle-logo light-circle-logo POPULARITY: light-star-logo light-star-logo light-star-logo light-star-logo light-star-logo