What is Spyware?
Spyware refers to programs that use your Internet connection to send information from your personal computer to some other computer, normally without your knowledge or permission. Most often this information is a record of your ongoing browsing habits, downloads, or it could be more personal data like your name and address.
Different strains of spyware perform different functions. Some might also hijack your browser to take you to an unexpected site, cause your computer to dial expensive 900 numbers, replace the Home page setting in your browser with another site, or serve you personal ads, even when you're offline. The form that serves personalized advertisements is called adware also known as malware or scumware.
Some programs that have included spyware, like RealPlayer, disclose this information in their terms and conditions when RealPlayer is installed, though most users don't read the terms and conditions when they install software, particularly if it is free. KaZaA, a free file sharing program, also includes it, and there are many others.
But spyware doesn't have to come bundled with another application to find its way on to your computer. In fact, most is installed surreptitiously. You might visit a website that pops up a window informing you the site won't display correctly unless you allow it to install a file or plug-in. Answering yes to a prompt that you don't understand can allow spyware to be loaded. You might also agree to load a program that, unbeknownst to you, has spyware code included.
The concern with spyware, whether its presence is disclosed or not, and the reason it is universally reviled by so many, is that the user cannot verify or monitor what is actually being gathered and sent from their computer. There is no built-in mechanism for the user to oversee the process and no checks-and-balances in place, legally or otherwise to ensure the security of, or confirm just how the information is being used. Spyware is virtually unregulated. Add to this unfavorable scenario the fact that it uses personal resources: your bandwidth, processing power, and memory, to perform work for an outside entity at the expense of your privacy. Still, some programs that include it are very popular.
It is estimated that 90% of all computers on the Internet are infected with spyware.
Some telltale signs of infection are:
- Your computer slows to a crawl due to several such programs using up your memory resources.
- Advertisements pop up even when you are offline.
- You click on a link to go to one site, but your browser gets hijacked and you end up at another site.
- Your computer is dialing up numbers on its own that show up on your phone bill.
- When you enter a search item, a new and unexpected site handles the search.
- Your bookmarks change on their own.
- You click your Home button but it takes you to a new site, and when you switch the setting back, the new site appears again anyway.
- You get pop-up ads that address you by name even when you have not visited site at which you have registered.
Some anti-spyware programs will scan your computer for existing software and alert you to what it finds. You can quarantine suspected bugs so they can no longer function. It is very important to read the manual as removing spyware can lead to system or software problems if done incorrectly.
After running software to quarantine or remove the spyware, make sure you're using software to prevent new programs from being installed.
These programs do not load into memory or run in the background. They rely on internal databases of known spyware keys, which they use to scan and protect your system. Therefore, like a virus program, their databases must be updated regularly.
Does Aol work with FBI or Homeland Security to hack our computers?
The well known are as follows:
Downloader: A kind of malicious program can download penetration from Internet.
Dropper: A kind of design used to put other malicious software into computers which are attacked.
Backdoor: A kind of application used to communicate with remote attacker, allowing them to gain access to the system and control system.
Keylogger: The program can record user information when typing in each keyboard and then send the information to remote attackers.
Dialer: A kind of program used to connect additional billing numbers. Users almost can't pay attention to the creation of a new connection. Dialer only can harm the users who use dial-up modems.
A Trojan usually adopts an executable file form with the extension exe. If files on computer are detected b the Trojan, you should delete them as it is the most likely to contain malicious code.
Famous Trojan horse examples: NetBus, Trojandownloader. Small. ZL, Slapper.
If you have been infected with a Trojan virus, you need a trojan remover software to help you scan and kill the Trojan.
I find one of the best defenses when trying a new site is to use McAfee Site Advisor. Site Advisor is a free plug-in that tests almost every website you search for. The application either gives a green, yellow, red, or grey light to alert you to the potential dangers of opening a web page.
The green light means that the site has been tested clean for downloads, email spam, and malicious links. The yellow bubbles will alert you to a site with potentially questionable downloads, or excessive emails. The red bubbles mean that the site has malicious links, emails, and downloads. Lastly, the grey bubbles means McAfee has not tested the site
The application is not an adware or spyware removal tool, but it will detect malicious software and alert you to it before you visit the site.
Google does a pretty good job of scanning sites that try to install spyware on visitors' computers. If you visit such a site from a search result on Google, they will give a very clear warning before you click through to the destination.
Of course using anti-spyware software is the more comprehensive approach. But, using Google to test new sites can work as good backup.
Post your comments