Examples Of Spyware And What They Are
Spyware is a general term used to describe software that performs certain behaviors, such as advertising, collecting personal information, or changing the configuration of your computer, usually without first obtaining your consent.
Spyware is often associated with software displaying advertisements (called adware) or software that tracks personal or sensitive information.
That does not mean that all software that provides ads or tracks your online activities is bad. For example, you can sign up for a free music service, but "pay" for the service by agreeing to receive targeted ads. If you understand the terms and accept them, you may have decided that it is fair compensation. You can also accept that the company tracks your online activities to determine which ads to show you.
Other types of Spyware make changes to your computer that can be annoying and can cause the computer to slow down or fail.
These programs can change the home page or search page of web browsers, or add additional components to your browser that you do not need or want. These programs also make it very difficult for you to change your settings to the way you originally had them.
The key in all cases is whether you (or someone who uses your computer) understands what the software will do and have agreed to install the software on your computer.
There are several ways that Spyware or other unwanted software can get on your computer. A common trick is to install the software covertly during the installation of other software you want, such as a music or video file sharing program.
Any software that collects information in a covert manner through the user's Internet connection without their knowledge, generally for advertising purposes. Spyware applications are usually included as a hidden component of the freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that most shareware and freeware applications do not come with SpyWare. Once installed, Spyware monitors user activity on the Internet and transmits that information in the background to another person. Spyware can also collect information about email addresses and even passwords and credit card numbers
In addition to issues of ethics and privacy, SpyWare steals the user using computer memory resources and also eating breadth band, as it sends information to the home base of the spyware through the user's Internet connection. Because SpyWare uses memory and system resources, applications that run in the background can cause system failures or general system instability.
Because SpyWare exists as stand-alone executable programs, they have the ability to monitor keys and scan files on the hard drive, detect other applications, such as chat programs or text processors, install other SpyWare programs, read cookies, change the default homepage in the web browser, returning this information to the SpyWare author who will use it for advertising or marketing purposes. or sell the information to another party.
The license agreements accompanying software downloads sometimes warn the user that a SpyWare program will be installed along with the requested software, but license agreements can not always be read completely because the notice of a SpyWare installation it is often written in obtuse and hard-to-read legal denials.
Examples of SpyWare
Common SpyWare programs illustrate the diversity of behaviors found in these attacks. Keep in mind that, as with computer viruses, researchers give names to SpyWare programs that can not be used by their creators. Programs can be grouped into "families" based not on a shared program code, but on common behaviors or "following the money" of apparent financial or business connections. For example, several of the SpyWare programs distributed by Claria are collectively known as "Gator." Likewise, programs that are installed frequently can be described as parts of the same SpyWare package, even if they work separately.
or CoolWebSearch, a group of programs, exploits Internet Explorer vulnerabilities. The package directs traffic to ads on websites, including coolwebsearch.com. It displays pop-up advertisements, rewrites search engine results and alters the host file of the infected computer to direct DNS lookups to these sites.
or Internet Optimizer, also known as DyFuCa, redirects Internet Explorer error pages to advertisements. When users follow a broken link or enter an erroneous URL, they see an ad page. However, because password-protected websites (basic HTTP authentication) use the same mechanism as HTTP errors, Internet Optimizer makes it impossible for the user to access password-protected sites.
or Zango (formerly 180 solutions) transmit detailed information to advertisers about the websites visited by users. It also alters HTTP requests for affiliate ads linked from a website, so that the ads generate unearned gains for 180 Solutions Company. Open pop-up ads that cover the websites of competing companies.
or HuntBar, also known as WinTools or Adware, WebSearch was installed by an ActiveX ActiveX download on affiliated websites or by advertisements displayed by other SpyWare programs. -An example of how SpyWare can install more SpyWare. These programs add toolbars to IE, track aggregate browsing behavior, redirect affiliate referrals, and show ads.
oZlob Trojan or simply Zlob, it is downloaded to your computer through the ActiveX codec and reports back to the Control Server. Part of the information can be your search history, the websites you visited and even Key Strokes.