Application Control Application Control

Browse the Fortiguard Labs extensive encyclopedia of applications. Click any title to view more details of the application. Can't find what you are looking for? Try using the search bar above to find a specific application description.

This indicates an attempt to edit a file on GitHub.GitHub is a development platform that allows users to host and review code,...

Feb 23, 2018 RISK: POPULARITY:
This indicates an attempt to upload a file onto GitHub.GitHub is a development platform that allows users to host and review code,...

Feb 23, 2018 RISK: POPULARITY:
This indicates an attempt to access Microsoft Outlook Office 365.Microsoft Outlook is an email application service by Microsoft....

Feb 14, 2018 RISK: POPULARITY:
This indicates an attempt to use DuckDuckGo Search with the SafeSearch setting turned off.DuckDuckGo Safe Search blocks explicit...

Jan 16, 2018 RISK: POPULARITY:
This indicates an attempt to make a DuckDuckGo Search. DuckDuckGo search is a search engine with the emphasis on protecting users...

Jan 16, 2018 RISK: POPULARITY:
This indicates an attempt to tunnel SSH data over SOCKS protocol.

Dec 28, 2017 RISK: POPULARITY:
This indicates an attempt to access Amazon Music.Amazon Music, previously known as Amazon MP3, is an online music streaming service....

Dec 19, 2017 RISK: POPULARITY:
This indicates an attempt to access To Be Honest (tbh).To Be Honest (tbh) is a social media application that allows users to create...

Oct 26, 2017 RISK: POPULARITY:
This indicates an attempt to use Sarahah.Sarahah is a platform which allows users to send and receive messages anonymously.

Aug 25, 2017 RISK: POPULARITY:
This indicates an attempt to access ZeroNet. ZeroNet is a decentralized network of peer-to-peer users. The website content distributed...

Aug 01, 2017 RISK: POPULARITY:
This indicates an attempt to use Bitcoin mining protocols.Bitcoin is a cryptocurrency and a digital payment system. Bitcoin mining...

Jul 25, 2017 RISK: POPULARITY:
This indicates detection of the IEC 60870-5-104 control functions unnumbered U-format command.IEC 60870-5-104 is a set of standards...

Jul 10, 2017 RISK: POPULARITY:
This indicates an attempt to use a Ethereum Cryptocurrency miner.Ethereum is an open-source, public, blockchain-based distributed...

May 12, 2017 RISK: POPULARITY:
This indicates an attempt to use a ZCash Cryptocurrency miner.Zcash is a decentralized and open-source cryptocurrency introduced...

May 12, 2017 RISK: POPULARITY:
This indicates an attempt to use MinerGate Cryptocurrency Miner.MinerGate is mining software that supports 14 types of cryptocurrencies,...

May 12, 2017 RISK: POPULARITY: