Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Ernest_at_the_Beach
Spyware Definitions
Adware is advertising-supported software that displays pop-up advertisements whenever the program is running. Often the software is available online for free, and the advertisements create revenue for the company. Although it's seemingly harmless (aside from the intrusiveness and annoyance of pop-up ads), adware can install components onto your computer that track personal information (including your age, sex, location, buying preferences, or surfing habits) for marketing purposes.

Some advertising-supported software will not inform you when it installs adware on your system, or will bury such notification in small print. In many cases, the software that is financially supported by adware will cease to function without the adware component. Sometimes adware will infiltrate your computer even when you decline the installation.
Adware cookies are pieces of software that Web sites store on your hard drive when you visit a site. Some cookies exist just to save you time-for example, when you check a box for a Web site to remember your password on your computer. But some sites now deposit adware cookies, which store personal information (like your surfing habits, usernames and passwords, and areas of interest) and share the information with other Web sites. This sharing of information allows marketing firms to create a user profile based on your personal information and sell it to other firms.

Adware cookies are installed and accessed without your knowledge or consent.
System monitors can capture virtually everything you do on your computer, from keystrokes, emails, and chat room dialogue to which sites you visit and which programs you run. System monitors usually run in the background so that you don't know you're being watched. The information gathered by the system monitor is stored on your computer in an encrypted log file for later retrieval. Some programs can even email the log files to other locations.

There has been a recent wave of system monitoring tools disguised as email attachments or free software products.
Trojan horses are malicious programs that appear as harmless or desirable applications. Trojan horses are designed to steal or encode computer data, and to destroy your system. Some Trojan horses, called RATs (Remote Administration Tools), give attackers unrestricted access to your computer whenever you're online. The attacker can perform activities like file transfers, adding or deleting files and programs, and controlling your mouse and keyboard.

Trojan horses are distributed as email attachments, or they can be bundled with other software programs.

13 posted on 12/14/2004 6:34:30 PM PST by Ernest_at_the_Beach (A Proud member of Free Republic ~~The New Face of the Fourth Estate since 1996.)
[ Post Reply | Private Reply | To 8 | View Replies ]


To: Ernest_at_the_Beach

CW Shredder is a nice little program that will help remove Cool Web Search. But you also have to comb through the Registry to get rid of it completely.

I hate to think how much of my computer's memory is taken up by Norton AntiVirus, ZoneAlarm, Spyware Blaster, Spyware Guard, SpamPal, Ad Muncher, and all the other programs I use to prevent infections. It wouldn't surprise me that it's about 75% protection and 25% programs that I'm running. And that's not to speak of all the complications that have been introduced into Windows itself in order to block these various malicious attacks. SP2 has definitely slowed my computers a bit.


32 posted on 12/14/2004 6:57:38 PM PST by Cicero (Nil illegitemus carborundum est)
[ Post Reply | Private Reply | To 13 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson