Exploits are attacks against a network using weaknesses in software such as
operating systems and applications. These attacks usually take the form of intrusion
attempts and
attempts to destroy or capture data. These filters seek to protect software from malicious
attacks across a network by detecting and blocking the request.
The two most common methods for exploiting software include email and Web
browsing. All Web browsers and many email clients have powerful capabilities that
access
applications and operating systems. Attackers can create attachments that scan for
and exploit
this software.