Top Banner

of 13

Spyware & Adware

Jan 02, 2016



Spyware & Adware. What is it and how to make your computer go fast again. What is Spyware?. ParasiteWare. Adware. Spyware. Malware. Page Hijackers. Dialers. Spyware Vs. Virus. Who Does SpyWare Effect. Windows Users YES!!!!!!!!! Mac UsersNot Really - PowerPoint PPT Presentation

  • Spyware & AdwareWhat is it and how to make your computer go fast again.

  • What is Spyware?ParasiteWareAdwareSpyware


    Page HijackersDialers

  • Spyware Vs. Virus

  • Who Does SpyWare Effect

    Windows Users YES!!!!!!!!!

    Mac UsersNot Really

    Linux/Unix UsersNot Really

  • How Do You Contract SpywareVisiting websitesVia E-mailInstalling it yourself

  • How to Cleanup SpywareAd-Aware SE Personal EditionSpyBot Search&Destroy


  • How Do I know what is safe to Remove?If a spyware scanning application found it, it is removable.

    Only exception is free software that comes with Ads.

  • How to Prevent SpywareAd-Aware SE Personal EditionSpyBot Search&DestroySpywareBlasterSpywareGuardMacScan

    Install a pop-up blocker

    READ EULA before installing Software

    Stay up to date with your security patches!!!!


  • Windows Firewalling

  • Windows Patching

  • Mac Firewalling

  • Mac Patching

  • Additional

    ParasiteWareParasiteWare is the term for any Adware that by default overwrites certain affiliate tracking links. These tracking links are used by webmasters to sell products and to help fund websites. The controversy is centered on companies like WhenU, eBates, and Top Moxie, a popular maker of Adware applications. These companies have release their software to assist users in getting credit for rebates, cash back shopping, or contributions to funds. To the end user ParasiteWare represents little in the way of a security threat.AdwareAdware, also known as an Adbot, can do a number of things from profile your online surfing and spending habits to popping up annoying ad windows as you surf. In some cases Adware has been bundled (i.e. peer-to-peer file swapping products) with other software without the user's knowledge or slipped in the fine print of a EULA (End User License Agreement). Not all Adware is bad, but often users are annoyed by adware's intrusive behavior. Keep in mind that by removing Adware sometimes the program it came bundled with for free may stop functioning. Some Adware, dubbed a "BackDoor Santa" may not perform any activity other then profile a user's surfing activity for study.AdWare can be obnoxious in that it performs "drive-by downloads". Drive-by downloads are accomplished by providing a misleading dialogue box or other methods of stealth installation. Many times users have no idea they have installed the application. Often Adware makers make their application difficult to uninstall.A "EULA" or End User License Agreement is the agreement you accept when you click "OK" or "Continue" when you are installing software. Many users never bother to read the EULA. It is imperative to actually read this agreement before you install any software. No matter how tedious the EULA, you should be able to find out the intent BEFORE you install the software. If you have questions about the EULA- e-mail the company and ask them for clarification.SpywareSpyware is potentially more dangerous beast than Adware because it can record your keystrokes, history, passwords, and other confidential and private information. Spyware is often sold as a spouse monitor, child monitor, a surveillance tool or simply as a tool to spy on users to gain unauthorized access. Spyware is also known as: snoopware, PC surveillance, key logger, system recorders, Parental control software, PC recorder, Detective software and Internet monitoring software. Spyware covertly gathers user information and activity without the user's knowledge. Spy software can record your keystrokes as you type them, passwords, credit card numbers, sensitive information, where you surf, chat logs, and can even take random screenshots of your activity. Basically whatever you do on the computer is completely viewable by the spy. You do not have to be connected to the Internet to be spied upon. The latest permutations of Spyware include the use of routines to mail out user activity via e-mail or posting information to the web where the spy can view it at their leisure. Also many spyware vendors use "stealth routines" and "polymorphic" (meaning to change" techniques to avoid detection and removal by popular anti-spy software. In some cases Spyware vendors have went as far as to counter-attack anti-spy packages by attempting to break their use. In addition they may use routines to re-install the spyware application after it has been detected.MalwareMalware is slang for malicious software. Malware is software designed specifically to disrupt a computer system. A trojan horse , worm or a virus could be classified as Malware. Some advertising software can be malicious in that it can try to re-install itself after you remove it. For the purpose of simplicity Malware is software specifically engineered to damage your machine or interrupt the normal computing environment. Examples of Malware include:Page HijackersHijackers are applications that attempt to usurp control of the user's home page and reset it with one of the hijackers choosing. They are a low security threat, but obnoxious. Most Hijackers use stealth techniques or trick dialogue boxes to perform installation.DialersA dialer is a type of software used by pornographic vendors. Once dialer software is downloaded the user is disconnected from their modem's usual Internet service provider and another phone number and the user is billed. While dialers do not spy on users they are malevolent in nature because they can cause huge financial harm to the victim.