Your SlideShare is downloading. ×
Virus - WormsVirusFrom Wikipedia, the free encyclopediaNot to be confused with Malware.A computer virus is a computer prog...
4.1 Avoiding bait files and other undesirable hosts4.2 Stealth4.2.1 Self-modification4.2.2 Encryption with a variable key4...
computer with its own program, so that the second computer would also begindialing random numbers, in search of yet anothe...
also spread to Macintosh computers. Although most of these viruses did nothave the ability to send infected email messages...
a system-wide scan. If the virus scanner fails to notice that such a virus ispresent in memory the virus can "piggy-back" ...
quite small (tens of bytes) and unpack a fairly large virus. This is analogous to abiological "prion" in the way it works ...
suspicious programs, such as small program files or programs that containcertain patterns of garbage instructions.A relate...
case of polymorphic viruses, however, this decryption module is also modified oneach infection. A well-written polymorphic...
An Internet based experiment revealed that there were cases when peoplewillingly pressed a particular button to download a...
Some anti-virus programs are able to scan opened files in addition to sent andreceived email messages "on the fly" in a si...
antivirus programs in one operation.Operating system reinstallationReinstalling the operating system is another approach t...
^ von Neumann, John (1966). "Theory of Self-Reproducing Automata". Essayson Cellular Automata (University of Illinois Pres...^ "Yahoo Tech: Viruses! In! Space!" http://...
Privacy-invasive software · Spyware · Botnet · Keystroke logging · Web threats ·Fraudulent dialer · MalbotBy operating sys...
files on a host system (e.g., the ExploreZip worm), encrypt files in a cryptoviralextortion attack, or send documents via ...
Anti-virus and anti-spyware software are helpful, but must be kept up-to-date withnew pattern files at least every few day...
^ "Unavailable".^ "Uncovered: Trojans as Spam Robots". heise online.^ "Hacker threats to bookies probed". BBC News. Februa...
Malware for profitPrivacy-invasive software · Spyware · Botnet · Keystroke logging · Web threats ·Fraudulent dialer · Malb...
1.7 Blog, wiki, and guestbook1.8 Spam targeting video sharing sites1.9 SPIT2 Noncommercial forms3 Geographical origins4 Hi...
the same time, it is becoming clear that malware authors, spammers, andphishers are learning from each other, and possibly...
common in MMORPGs where the spammers are trying to sell game-related"items" for real-world money, chiefly among these item...
infomercial-like format selling their product which feature actors and paidtestimonials, though the promoted product or se...
filled menu, a chorus of Viking patrons drowns out all conversations with a songrepeating "Spam, Spam, Spam, Spam... lovel...
prospects, although just as unsolicited, was called velveeta (after the cheeseproduct). But this latter term didnt persist...
generic term." Hormel stated on its website: "Ultimately, we are trying to avoidthe day when the consuming public asks, Wh...
latter of which is illegal in many jurisdictions. Recently, there has been anoticeable increase in spam advertising websit...
and punitive damagesDamage: Impact on the community and/or communication channels beingspammed (see Newsgroup spam)Benefit...
have valued the relative anarchy of the Internet, and bridle at the idea ofrestrictions placed upon it.[citation needed] A...
United StatesSanford Wallace and Cyber Promotions were the target of a string of lawsuits,many of which were settled out o...
won £270 against Media Logistics UK who sent junk e-mails to his personalaccount.[47]In January 2007, a Sheriff Court in S...
Image spamInternet TrollJob scamsJunk mailList of spammersMalwareNetwork Abuse ClearinghousePhishingScamScad (scam ad)Soci...
Social Networks. In ACM SIGIR Conference, Boston, MA, USA, July 2009..^ See: Advance fee fraud^ SA cops, Interpol probe mu...
"?".^ Ex-AOL employee pleads guilty in spam case. (2005, February 4). CNN.Retrieved 7 March 2007, from ...
1 December 2009: arrest of a major - This website provides you with disposable e-mail addresseswhich ex...
3 Examples of adware4 Examples of advertising-delivery tools5 See also6 References7 Further reading8 External links[edit]A...
Mirar ToolbarMyWay SearchbarTribal FusionViewpoint Media PlayerWhenU SaveNowZango productsZwinky[edit]See alsoComputer ins...
Upcoming SlideShare
Loading in...5



Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Transcript of "εργασια"

  1. 1. Virus - WormsVirusFrom Wikipedia, the free encyclopediaNot to be confused with Malware.A computer virus is a computer program that can copy itself[1] and infect acomputer. The term "virus" is also commonly but erroneously used to refer toother types of malware, including but not limited to adware and spywareprograms that do not have the reproductive ability. A true virus can spread fromone computer to another (in some form of executable code) when its host istaken to the target computer; for instance because a user sent it over a networkor the Internet, or carried it on a removable medium such as a floppy disk, CD,DVD, or USB drive.[2]Viruses can increase their chances of spreading to other computers by infectingfiles on a network file system or a file system that is accessed by anothercomputer.[3][4]As stated above, the term "computer virus" is sometimes used as a catch-allphrase to include all types of malware, even those that do not have thereproductive ability. Malware includes computer viruses, computer worms, Trojanhorses, most rootkits, spyware, dishonest adware and other malicious andunwanted software, including true viruses. Viruses are sometimes confused withworms and Trojan horses, which are technically different. A worm can exploitsecurity vulnerabilities to spread itself automatically to other computers throughnetworks, while a Trojan horse is a program that appears harmless but hidesmalicious functions. Worms and Trojan horses, like viruses, may harm acomputer systems data or performance. Some viruses and other malware havesymptoms noticeable to the computer user, but many are surreptitious or simplydo nothing to call attention to themselves. Some viruses do nothing beyondreproducing themselves.Contents [hide]1 History1.1 Academic work1.2 Science Fiction1.3 Virus programs2 Infection strategies2.1 Nonresident viruses2.2 Resident viruses3 Vectors and hosts4 Methods to avoid detection
  2. 2. 4.1 Avoiding bait files and other undesirable hosts4.2 Stealth4.2.1 Self-modification4.2.2 Encryption with a variable key4.2.3 Polymorphic code4.2.4 Metamorphic code5 Vulnerability and countermeasures5.1 The vulnerability of operating systems to viruses5.2 The role of software development5.3 Anti-virus software and other preventive measures5.4 Recovery methods5.4.1 Virus removal5.4.2 Operating system reinstallation6 See also7 References8 Further reading9 External linksHistoryAcademic workThe first academic work on the theory of computer viruses (although the term"computer virus" was not invented at that time) was done by John von Neumannin 1949 who held lectures at the University of Illinois about the "Theory andOrganization of Complicated Automata". The work of von Neumann was laterpublished as the "Theory of self-reproducing automata".[5] In his essay vonNeumann postulated that a computer program could reproduce.In 1972 Veith Risak published his article "Selbstreproduzierende Automaten mitminimaler Informationsübertragung" (Self-reproducing automata with minimalinformation exchange).[6] The article describes a fully functional virus written inassembler language for a SIEMENS 4004/35 computer system.In 1980 Jürgen Kraus wrote his diplom thesis "Selbstreproduktion beiProgrammen" (Self-reproduction of programs) at the University of Dortmund.[7]In his work Kraus postulated that computer programs can behave in a waysimilar to biological viruses.In 1984 Fred Cohen from the University of Southern California wrote his paper"Computer Viruses - Theory and Experiments".[8] It was the first paper toexplicitly call a self-reproducing program a "virus"; a term introduced by hismentor Leonard Adleman.An article that describes "useful virus functionalities" was published by J. B.Gunn under the title "Use of virus functions to provide a virtual APL interpreterunder user control" in 1984.[9]Science FictionThe Terminal Man, a science fiction novel by Michael Crichton (1972), told (as asideline story) of a computer with telephone modem dialing capability, which hadbeen programmed to randomly dial phone numbers until it hit a modem that isanswered by another computer. It then attempted to program the answering
  3. 3. computer with its own program, so that the second computer would also begindialing random numbers, in search of yet another computer to program. Theprogram is assumed to spread exponentially through susceptible computers.The actual term virus was first used in David Gerrolds 1972 novel, WhenHARLIE Was One. In that novel, a sentient computer named HARLIE writes viralsoftware to retrieve damaging personal information from other computers toblackmail the man who wants to turn him off.Virus programsThe Creeper virus was first detected on ARPANET, the forerunner of theInternet, in the early 1970s.[10] Creeper was an experimental self-replicatingprogram written by Bob Thomas at BBN Technologies in 1971.[11] Creeper usedthe ARPANET to infect DEC PDP-10 computers running the TENEX operatingsystem.[12] Creeper gained access via the ARPANET and copied itself to theremote system where the message, "Im the creeper, catch me if you can!" wasdisplayed. The Reaper program was created to delete Creeper.[13]A program called "Elk Cloner" was the first computer virus to appear "in the wild"— that is, outside the single computer or lab where it was created.[14] Written in1981 by Richard Skrenta, it attached itself to the Apple DOS 3.3 operatingsystem and spread via floppy disk.[14][15] This virus, created as a practical jokewhen Skrenta was still in high school, was injected in a game on a floppy disk.On its 50th use the Elk Cloner virus would be activated, infecting the computerand displaying a short poem beginning "Elk Cloner: The program with apersonality."The first PC virus in the wild was a boot sector virus dubbed (c)Brain,[16] createdin 1986 by the Farooq Alvi Brothers in Lahore, Pakistan, reportedly to deterpiracy of the software they had written.[17]Before computer networks became widespread, most viruses spread onremovable media, particularly floppy disks. In the early days of the personalcomputer, many users regularly exchanged information and programs onfloppies. Some viruses spread by infecting programs stored on these disks, whileothers installed themselves into the disk boot sector, ensuring that they would berun when the user booted the computer from the disk, usually inadvertently. PCsof the era would attempt to boot first from a floppy if one had been left in thedrive. Until floppy disks fell out of use, this was the most successful infectionstrategy and boot sector viruses were the most common in the wild for manyyears.[1]Traditional computer viruses emerged in the 1980s, driven by the spread ofpersonal computers and the resultant increase in BBS, modem use, and softwaresharing. Bulletin board-driven software sharing contributed directly to the spreadof Trojan horse programs, and viruses were written to infect popularly tradedsoftware. Shareware and bootleg software were equally common vectors forviruses on BBSs.[citation needed]Macro viruses have become common since the mid-1990s. Most of these virusesare written in the scripting languages for Microsoft programs such as Word andExcel and spread throughout Microsoft Office by infecting documents andspreadsheets. Since Word and Excel were also available for Mac OS, most could
  4. 4. also spread to Macintosh computers. Although most of these viruses did nothave the ability to send infected email messages, those viruses which did takeadvantage of the Microsoft Outlook COM interface.[citation needed]Some old versions of Microsoft Word allow macros to replicate themselves withadditional blank lines. If two macro viruses simultaneously infect a document, thecombination of the two, if also self-replicating, can appear as a "mating" of thetwo and would likely be detected as a virus unique from the "parents".[18]A virus may also send a web address link as an instant message to all thecontacts on an infected machine. If the recipient, thinking the link is from a friend(a trusted source) follows the link to the website, the virus hosted at the site maybe able to infect this new computer and continue propagating.Viruses that spread using cross-site scripting were first reported in 2002,[19] andwere academically demonstrated in 2005.[20] There have been multipleinstances of the cross-site scripting viruses in the wild, exploiting websites suchas MySpace and Yahoo.Infection strategiesIn order to replicate itself, a virus must be permitted to execute code and write tomemory. For this reason, many viruses attach themselves to executable files thatmay be part of legitimate programs. If a user attempts to launch an infectedprogram, the virus code may be executed simultaneously. Viruses can bedivided into two types based on their behavior when they are executed.Nonresident viruses immediately search for other hosts that can be infected,infect those targets, and finally transfer control to the application program theyinfected. Resident viruses do not search for hosts when they are started. Instead,a resident virus loads itself into memory on execution and transfers control to thehost program. The virus stays active in the background and infects new hostswhen those files are accessed by other programs or the operating system itself.Nonresident virusesNonresident viruses can be thought of as consisting of a finder module and areplication module. The finder module is responsible for finding new files toinfect. For each new executable file the finder module encounters, it calls thereplication module to infect that file.Resident virusesResident viruses contain a replication module that is similar to the one that isemployed by nonresident viruses. This module, however, is not called by a findermodule. The virus loads the replication module into memory when it is executedinstead and ensures that this module is executed each time the operating systemis called to perform a certain operation. The replication module can be called, forexample, each time the operating system executes a file. In this case the virusinfects every suitable program that is executed on the computer.Resident viruses are sometimes subdivided into a category of fast infectors and acategory of slow infectors. Fast infectors are designed to infect as many files aspossible. A fast infector, for instance, can infect every potential host file that isaccessed. This poses a special problem when using anti-virus software, since avirus scanner will access every potential host file on a computer when it performs
  5. 5. a system-wide scan. If the virus scanner fails to notice that such a virus ispresent in memory the virus can "piggy-back" on the virus scanner and in thisway infect all files that are scanned. Fast infectors rely on their fast infection rateto spread. The disadvantage of this method is that infecting many files may makedetection more likely, because the virus may slow down a computer or performmany suspicious actions that can be noticed by anti-virus software. Slowinfectors, on the other hand, are designed to infect hosts infrequently. Some slowinfectors, for instance, only infect files when they are copied. Slow infectors aredesigned to avoid detection by limiting their actions: they are less likely to slowdown a computer noticeably and will, at most, infrequently trigger anti-virussoftware that detects suspicious behavior by programs. The slow infectorapproach, however, does not seem very successful.Vectors and hostsViruses have targeted various types of transmission media or hosts. This list isnot exhaustive:Binary executable files (such as COM files and EXE files in MS-DOS, PortableExecutable files in Microsoft Windows, the Mach-O format in OSX, and ELF filesin Linux)Volume Boot Records of floppy disks and hard disk partitionsThe master boot record (MBR) of a hard diskGeneral-purpose script files (such as batch files in MS-DOS and MicrosoftWindows, VBScript files, and shell script files on Unix-like platforms).Application-specific script files (such as Telix-scripts)System specific autorun script files (such as Autorun.inf file needed by Windowsto automatically run software stored on USB Memory Storage Devices).Documents that can contain macros (such as Microsoft Word documents,Microsoft Excel spreadsheets, AmiPro documents, and Microsoft Accessdatabase files)Cross-site scripting vulnerabilities in web applications (see XSS Worm)Arbitrary computer files. An exploitable buffer overflow, format string, racecondition or other exploitable bug in a program which reads the file could be usedto trigger the execution of code hidden within it. Most bugs of this type can bemade more difficult to exploit in computer architectures with protection featuressuch as an execute disable bit and/or address space layout randomization.PDFs, like HTML, may link to malicious code. PDFs can also be infected withmalicious code.In operating systems that use file extensions to determine program associations(such as Microsoft Windows), the extensions may be hidden from the user bydefault. This makes it possible to create a file that is of a different type than itappears to the user. For example, an executable may be created named"picture.png.exe", in which the user sees only "picture.png" and thereforeassumes that this file is an image and most likely is safe, yet when opened runsthe executable on the client machine.An additional method is to generate the virus code from parts of existingoperating system files by using the CRC16/CRC32 data. The initial code can be
  6. 6. quite small (tens of bytes) and unpack a fairly large virus. This is analogous to abiological "prion" in the way it works but is vulnerable to signature baseddetection. This attack has not yet been seen "in the wild".Methods to avoid detectionIn order to avoid detection by users, some viruses employ different kinds ofdeception. Some old viruses, especially on the MS-DOS platform, make sure thatthe "last modified" date of a host file stays the same when the file is infected bythe virus. This approach does not fool anti-virus software, however, especiallythose which maintain and date Cyclic redundancy checks on file changes.Some viruses can infect files without increasing their sizes or damaging the files.They accomplish this by overwriting unused areas of executable files. These arecalled cavity viruses. For example, the CIH virus, or Chernobyl Virus, infectsPortable Executable files. Because those files have many empty gaps, the virus,which was 1 KB in length, did not add to the size of the file.Some viruses try to avoid detection by killing the tasks associated with antivirussoftware before it can detect them.As computers and operating systems grow larger and more complex, old hidingtechniques need to be updated or replaced. Defending a computer againstviruses may demand that a file system migrate towards detailed and explicitpermission for every kind of file access.Avoiding bait files and other undesirable hostsA virus needs to infect hosts in order to spread further. In some cases, it might bea bad idea to infect a host program. For example, many anti-virus programsperform an integrity check of their own code. Infecting such programs willtherefore increase the likelihood that the virus is detected. For this reason, someviruses are programmed not to infect programs that are known to be part of anti-virus software. Another type of host that viruses sometimes avoid are bait files.Bait files (or goat files) are files that are specially created by anti-virus software,or by anti-virus professionals themselves, to be infected by a virus. These filescan be created for various reasons, all of which are related to the detection of thevirus:Anti-virus professionals can use bait files to take a sample of a virus (i.e. a copyof a program file that is infected by the virus). It is more practical to store andexchange a small, infected bait file, than to exchange a large application programthat has been infected by the virus.Anti-virus professionals can use bait files to study the behavior of a virus andevaluate detection methods. This is especially useful when the virus ispolymorphic. In this case, the virus can be made to infect a large number of baitfiles. The infected files can be used to test whether a virus scanner detects allversions of the virus.Some anti-virus software employs bait files that are accessed regularly. Whenthese files are modified, the anti-virus software warns the user that a virus isprobably active on the system.Since bait files are used to detect the virus, or to make detection possible, a viruscan benefit from not infecting them. Viruses typically do this by avoiding
  7. 7. suspicious programs, such as small program files or programs that containcertain patterns of garbage instructions.A related strategy to make baiting difficult is sparse infection. Sometimes, sparseinfectors do not infect a host file that would be a suitable candidate for infection inother circumstances. For example, a virus can decide on a random basiswhether to infect a file or not, or a virus can only infect host files on particulardays of the week.StealthSome viruses try to trick antivirus software by intercepting its requests to theoperating system. A virus can hide itself by intercepting the antivirus software’srequest to read the file and passing the request to the virus, instead of the OS.The virus can then return an uninfected version of the file to the antivirussoftware, so that it seems that the file is "clean". Modern antivirus softwareemploys various techniques to counter stealth mechanisms of viruses. The onlycompletely reliable method to avoid stealth is to boot from a medium that isknown to be clean.Self-modificationMost modern antivirus programs try to find virus-patterns inside ordinaryprograms by scanning them for so-called virus signatures. A signature is acharacteristic byte-pattern that is part of a certain virus or family of viruses. If avirus scanner finds such a pattern in a file, it notifies the user that the file isinfected. The user can then delete, or (in some cases) "clean" or "heal" theinfected file. Some viruses employ techniques that make detection by means ofsignatures difficult but probably not impossible. These viruses modify their codeon each infection. That is, each infected file contains a different variant of thevirus.Encryption with a variable keyA more advanced method is the use of simple encryption to encipher the virus. Inthis case, the virus consists of a small decrypting module and an encrypted copyof the virus code. If the virus is encrypted with a different key for each infectedfile, the only part of the virus that remains constant is the decrypting module,which would (for example) be appended to the end. In this case, a virus scannercannot directly detect the virus using signatures, but it can still detect thedecrypting module, which still makes indirect detection of the virus possible.Since these would be symmetric keys, stored on the infected host, it is in factentirely possible to decrypt the final virus, but this is probably not required, sinceself-modifying code is such a rarity that it may be reason for virus scanners to atleast flag the file as suspicious.An old, but compact, encryption involves XORing each byte in a virus with aconstant, so that the exclusive-or operation had only to be repeated fordecryption. It is suspicious for a code to modify itself, so the code to do theencryption/decryption may be part of the signature in many virus definitions.Polymorphic codePolymorphic code was the first technique that posed a serious threat to virusscanners. Just like regular encrypted viruses, a polymorphic virus infects fileswith an encrypted copy of itself, which is decoded by a decryption module. In the
  8. 8. case of polymorphic viruses, however, this decryption module is also modified oneach infection. A well-written polymorphic virus therefore has no parts whichremain identical between infections, making it very difficult to detect directly usingsignatures. Antivirus software can detect it by decrypting the viruses using anemulator, or by statistical pattern analysis of the encrypted virus body. To enablepolymorphic code, the virus has to have a polymorphic engine (also calledmutating engine or mutation engine) somewhere in its encrypted body. SeePolymorphic code for technical detail on how such engines operate.[21]Some viruses employ polymorphic code in a way that constrains the mutationrate of the virus significantly. For example, a virus can be programmed to mutateonly slightly over time, or it can be programmed to refrain from mutating when itinfects a file on a computer that already contains copies of the virus. Theadvantage of using such slow polymorphic code is that it makes it more difficultfor antivirus professionals to obtain representative samples of the virus, becausebait files that are infected in one run will typically contain identical or similarsamples of the virus. This will make it more likely that the detection by the virusscanner will be unreliable, and that some instances of the virus may be able toavoid detection.Metamorphic codeTo avoid being detected by emulation, some viruses rewrite themselvescompletely each time they are to infect new executables. Viruses that utilize thistechnique are said to be metamorphic. To enable metamorphism, a metamorphicengine is needed. A metamorphic virus is usually very large and complex. Forexample, W32/Simile consisted of over 14000 lines of Assembly language code,90% of which is part of the metamorphic engine.[22][23]Vulnerability and countermeasuresThe vulnerability of operating systems to virusesJust as genetic diversity in a population decreases the chance of a singledisease wiping out a population, the diversity of software systems on a networksimilarly limits the destructive potential of viruses. This became a particularconcern in the 1990s, when Microsoft gained market dominance in desktopoperating systems and office suites. The users of Microsoft software (especiallynetworking software such as Microsoft Outlook and Internet Explorer) areespecially vulnerable to the spread of viruses. Microsoft software is targeted byvirus writers due to their desktop dominance, and is often criticized for includingmany errors and holes for virus writers to exploit. Integrated and non-integratedMicrosoft applications (such as Microsoft Office) and applications with scriptinglanguages with access to the file system (for example Visual Basic Script (VBS),and applications with networking features) are also particularly vulnerable.Although Windows is by far the most popular target operating system for viruswriters, viruses also exist on other platforms. Any operating system that allowsthird-party programs to run can theoretically run viruses. Some operatingsystems are more secure than others. Unix-based operating systems (andNTFS-aware applications on Windows NT based platforms) only allow their usersto run executables within their own protected memory space.
  9. 9. An Internet based experiment revealed that there were cases when peoplewillingly pressed a particular button to download a virus. Security analyst DidierStevens ran a half year advertising campaign on Google AdWords which said "Isyour PC virus-free? Get it infected here!". The result was 409 clicks.[24][25]As of 2006, there are relatively few security exploits targeting Mac OS X (with aUnix-based file system and kernel).[26] The number of viruses for the older Appleoperating systems, known as Mac OS Classic, varies greatly from source tosource, with Apple stating that there are only four known viruses, andindependent sources stating there are as many as 63 viruses. Many Mac OSClassic viruses targeted the HyperCard authoring environment. The difference invirus vulnerability between Macs and Windows is a chief selling point, one thatApple uses in their Get a Mac advertising.[27] In January 2009, Symantecannounced the discovery of a trojan that targets Macs.[28] This discovery did notgain much coverage until April 2009.[28]While Linux, and Unix in general, has always natively blocked normal users fromhaving access to make changes to the operating system environment, Windowsusers are generally not. This difference has continued partly due to thewidespread use of administrator accounts in contemporary versions like XP. In1997, when a virus for Linux was released – known as "Bliss" – leading antivirusvendors issued warnings that Unix-like systems could fall prey to viruses just likeWindows.[29] The Bliss virus may be considered characteristic of viruses – asopposed to worms – on Unix systems. Bliss requires that the user run it explicitly,and it can only infect programs that the user has the access to modify. UnlikeWindows users, most Unix users do not log in as an administrator user except toinstall or configure software; as a result, even if a user ran the virus, it could notharm their operating system. The Bliss virus never became widespread, andremains chiefly a research curiosity. Its creator later posted the source code toUsenet, allowing researchers to see how it worked.[30]The role of software developmentBecause software is often designed with security features to preventunauthorized use of system resources, many viruses must exploit software bugsin a system or application to spread. Software development strategies thatproduce large numbers of bugs will generally also produce potential exploits.Anti-virus software and other preventive measuresMany users install anti-virus software that can detect and eliminate knownviruses after the computer downloads or runs the executable. There are twocommon methods that an anti-virus software application uses to detect viruses.The first, and by far the most common method of virus detection is using a list ofvirus signature definitions. This works by examining the content of the computersmemory (its RAM, and boot sectors) and the files stored on fixed or removabledrives (hard drives, floppy drives), and comparing those files against a databaseof known virus "signatures". The disadvantage of this detection method is thatusers are only protected from viruses that pre-date their last virus definitionupdate. The second method is to use a heuristic algorithm to find viruses basedon common behaviors. This method has the ability to detect novel viruses thatanti-virus security firms have yet to create a signature for.
  10. 10. Some anti-virus programs are able to scan opened files in addition to sent andreceived email messages "on the fly" in a similar manner. This practice is knownas "on-access scanning". Anti-virus software does not change the underlyingcapability of host software to transmit viruses. Users must update their softwareregularly to patch security holes. Anti-virus software also needs to be regularlyupdated in order to recognize the latest threats.One may also minimize the damage done by viruses by making regular backupsof data (and the operating systems) on different media, that are either keptunconnected to the system (most of the time), read-only or not accessible forother reasons, such as using different file systems. This way, if data is lostthrough a virus, one can start again using the backup (which should preferablybe recent).If a backup session on optical media like CD and DVD is closed, it becomesread-only and can no longer be affected by a virus (so long as a virus or infectedfile was not copied onto the CD/DVD). Likewise, an operating system on abootable CD can be used to start the computer if the installed operating systemsbecome unusable. Backups on removable media must be carefully inspectedbefore restoration. The Gammima virus, for example, propagates via removableflash drives.[31][32]Recovery methodsOnce a computer has been compromised by a virus, it is usually unsafe tocontinue using the same computer without completely reinstalling the operatingsystem. However, there are a number of recovery options that exist after acomputer has a virus. These actions depend on severity of the type of virus.Virus removalOne possibility on Windows Me, Windows XP, Windows Vista and Windows 7 isa tool known as System Restore, which restores the registry and critical systemfiles to a previous checkpoint. Often a virus will cause a system to hang, and asubsequent hard reboot will render a system restore point from the same daycorrupt. Restore points from previous days should work provided the virus is notdesigned to corrupt the restore files or also exists in previous restore points.[33]Some viruses, however, disable System Restore and other important tools suchas Task Manager and Command Prompt. An example of a virus that does this isCiaDoor. However, many such viruses can be removed by rebooting thecomputer, entering Windows safe mode, and then using system tools.Administrators have the option to disable such tools from limited users for variousreasons (for example, to reduce potential damage from and the spread ofviruses). A virus can modify the registry to do the same even if the Administratoris controlling the computer; it blocks all users including the administrator fromaccessing the tools. The message "Task Manager has been disabled by youradministrator" may be displayed, even to the administrator.[citation needed]Users running a Microsoft operating system can access Microsofts website torun a free scan, provided they have their 20-digit registration number. Manywebsites run by anti-virus software companies provide free online virus scanning,with limited cleaning facilities (the purpose of the sites is to sell anti-virusproducts). Some websites allow a single suspicious file to be checked by many
  11. 11. antivirus programs in one operation.Operating system reinstallationReinstalling the operating system is another approach to virus removal. Itinvolves either reformatting the computers hard drive and installing the OS andall programs from original media, or restoring the entire partition with a cleanbackup image. User data can be restored by booting from a Live CD, or puttingthe hard drive into another computer and booting from its operating system withgreat care not to infect the second computer by executing any infected programson the original drive; and once the system has been restored precautions mustbe taken to avoid reinfection from a restored executable file.These methods are simple to do, may be faster than disinfecting a computer, andare guaranteed to remove any malware. If the operating system and programsmust be reinstalled from scratch, the time and effort to reinstall, reconfigure, andrestore user preferences must be taken into account. Restoring from an image ismuch faster, totally safe, and restores the exact configuration to the state it wasin when the image was made, with no further trouble.See alsoAdwareAntivirus softwareComputer insecurityComputer wormCrimewareCryptovirologyLinux malwareList of computer virus hoaxes Computer security portalList of computer virusesList of computer viruses (all)MalwareMobile virusesMultipartite virusSpamSpywareTrojan horse (computing)Virus hoaxReferences^ a b Dr. Solomons Virus Encyclopedia, 1995, ISBN 1897661002, Abstract at^ Jussi Parikka (2007) "Digital Contagions. A Media Archaeology of ComputerViruses", Peter Lang: New York. Digital Formations-series. ISBN978-0-8204-8837-0, p. 19^^ "What is a Computer Virus?". 1996-03-31. Retrieved2010-08-27.
  12. 12. ^ von Neumann, John (1966). "Theory of Self-Reproducing Automata". Essayson Cellular Automata (University of Illinois Press): 66–87. Retrieved June 10.,2010.^ Risak, Veith (1972), "Selbstreproduzierende Automaten mit minimalerInformationsübertragung", Zeitschrift für Maschinenbau und Elektrotechnik^ Kraus, Jürgen (February 1980), Selbstreproduktion bei Programmen^ Cohen, Fred (1984), Computer Viruses - Theory and Experiments^ Gunn, J.B. (June 1984). "Use of virus functions to provide a virtual APLinterpreter under user control". ACM SIGAPL APL Quote Quad archive (ACMNew York, NY, USA) 14 (4): 163–168. ISSN 0163-6006.^ "Virus list". Retrieved 2008-02-07.^ Thomas Chen, Jean-Marc Robert (2004). "The Evolution of Viruses andWorms". Retrieved 2009-02-16.^ Jussi Parikka (2007) "Digital Contagions. A Media Archaeology of ComputerViruses", Peter Lang: New York. Digital Formations-series. ISBN978-0-8204-8837-0, p. 50^ See page 86 of Computer Security Basics by Deborah Russell and G. T.Gangemi. OReilly, 1991. ISBN 0937175714^ a b Anick Jesdanun (1 September 2007). "School prank starts 25 years ofsecurity woes". CNBC. Retrieved 2010-01-07.^ "The anniversary of a nuisance".[dead link]^ "Boot sector virus repair". 2010-06-10. Retrieved2010-08-27.^ "Amjad Farooq Alvi Inventor of first PC Virus post by Zagham". YouTube.Retrieved 2010-08-27.^ Vesselin Bontchev. "Macro Virus Identification Problems". FRISK SoftwareInternational.^ Berend-Jan Wever. "XSS bug in hotmail login page".^ Wade Alcorn. "The Cross-site Scripting Virus".^ "Virus Bulletin : Glossary - Polymorphic virus". 2009-10-01.Retrieved 2010-08-27.^ Perriot, Fredrick; Peter Ferrie and Peter Szor (May 2002). "Striking Similarities"(PDF). Retrieved September 9, 2007.^ "Virus Bulletin : Glossary — Metamorphic virus". Retrieved2010-08-27.^ "Need a computer virus?- download now". Retrieved 2010-08-27.^ ""Is your PC virus-free? Get it infected here!" « Didier Stevens" 2006-10-23. Retrieved 2010-08-27.^ "Malware Evolution: Mac OS X Vulnerabilities 2005-2006". Kaspersky Lab.2006-07-24. Retrieved August 19, 2006.^ Apple - Get a Mac^ a b Sutter, John D. (22 April 2009). "Experts: Malicious program targets Macs" Retrieved 24 April 2009.^ McAfee. "McAfee discovers first Linux virus". news article.^ Axel Boldt. "Bliss, a Linux "virus"". news article.^ "Symantec Security Summary — W32.Gammima.AG."
  13. 13.^ "Yahoo Tech: Viruses! In! Space!"^ "Symantec Security Summary — W32.Gammima.AG and removal details." readingMark Russinovich, Advanced Malware Cleaning video, Microsoft TechEd: ITForum, November 2006Szor, Peter (2005). The Art of Computer Virus Research and Defense. Boston:Addison-Wesley. ISBN 0321304543.Jussi Parikka (2007) "Digital Contagions. A Media Archaeology of ComputerViruses", Peter Lang: New York. Digital Formations-series. ISBN978-0-8204-8837-0Burger, Ralf, 1991 Computer Viruses and Data ProtectionLudwig, Mark, 1996 The Little Black Book of Computer VirusesLudwig, Mark, 1995 The Giant Black Book of Computer VirusesLudwig, Mark, 1993 Computer Viruses, Artificial Life and EvolutionExternal linksViruses at the Open Directory ProjectUS Govt CERT (Computer Emergency Readiness Team) siteComputer Viruses - Theory and Experiments - The original paper published onthe topicHow Computer Viruses WorkA Brief History of PC Viruses" (early) by Dr. Alan SolomonAre Good Computer Viruses Still a Bad Idea?Protecting your Email from Viruses and Other MalWareHacking Away at the Counterculture by Andrew RossA Virus in Info-Space by Tony SampsonDr Aycocks Bad Idea by Tony SampsonDigital Monsters, Binary Aliens by Jussi ParikkaThe Universal Viral Machine" by Jussi ParikkaHypervirus: A Clinical Report" by Thierry BardiniVirus removal and other MalwareThe Cross-site Scripting VirusThe Virus UndergroundHistorys 50 Deadliest Computer Viruses by O.C. Ugwu[hide]v · d · eMalwareInfectious malwareComputer virus · Macro virus · List of computer viruses · Computer worm · List ofcomputer worms · Timeline of notable computer viruses and wormsConcealmentTrojan horse · Rootkit · BackdoorMalware for profit
  14. 14. Privacy-invasive software · Spyware · Botnet · Keystroke logging · Web threats ·Fraudulent dialer · MalbotBy operating systemLinux malware · Palm OS viruses · Mobile virusProtectionAntivirus software · Defensive computing · Firewall · Intrusion detection system ·Data loss prevention softwareLaw enforcementComputer surveillance · Operation: Bot RoastCategories: Computer viruses | Computer security exploitsWormsFrom Wikipedia, the free encyclopediaMorris Worm source code disk at the Computer History Museum.Spread of Conficker worm.A computer worm is a self-replicating malware computer program, which uses acomputer network to send copies of itself to other nodes (computers on thenetwork) and it may do so without any user intervention. This is due to securityshortcomings on the target computer. Unlike a computer virus, it does not needto attach itself to an existing program. Worms almost always cause at least someharm to the network, even if only by consuming bandwidth, whereas virusesalmost always corrupt or modify files on a targeted computer.Contents [hide]1 Payloads2 Worms with good intent3 Protecting against dangerous computer worms4 Mitigation techniques5 History6 See also7 References8 External linksPayloadsMany worms that have been created are only designed to spread, and dontattempt to alter the systems they pass through. However, as the Morris wormand Mydoom showed, even these "payload free" worms can cause majordisruption by increasing network traffic and other unintended effects. A "payload"is code in the worm designed to do more than spread the worm–it might delete
  15. 15. files on a host system (e.g., the ExploreZip worm), encrypt files in a cryptoviralextortion attack, or send documents via e-mail. A very common payload forworms is to install a backdoor in the infected computer to allow the creation of a"zombie" computer under control of the worm author. Networks of such machinesare often referred to as botnets and are very commonly used by spam sendersfor sending junk email or to cloak their websites address.[1] Spammers aretherefore thought to be a source of funding for the creation of such worms,[2][3]and the worm writers have been caught selling lists of IP addresses of infectedmachines.[4] Others try to blackmail companies with threatened DoS attacks.[5]Backdoors can be exploited by other malware, including worms. Examplesinclude Doomjuice, which spreads better using the backdoor opened byMydoom, and at least one instance of malware taking advantage of the rootkitand backdoor installed by the Sony/BMG DRM software utilized by millions ofmusic CDs prior to late 2005.[dubious – discuss]Worms with good intentBeginning with the very first research into worms at Xerox PARC, there havebeen attempts to create useful worms. The Nachi family of worms, for example,tried to download and install patches from Microsofts website to fix vulnerabilitiesin the host system–by exploiting those same vulnerabilities. In practice, althoughthis may have made these systems more secure, it generated considerablenetwork traffic, rebooted the machine in the course of patching it, and did its workwithout the consent of the computers owner or user.Some worms, such as XSS worms, have been written for research to determinethe factors of how worms spread, such as social activity and change in userbehavior, while other worms are little more than a prank, such as one that sendsthe popular image macro of an owl with the phrase "O RLY?" to a print queue inthe infected computer. Another research proposed what seems to be the firstcomputer worm that operates on the second layer of the OSI model (Data linkLayer), it utilizes topology information such as Content-addressable memory(CAM) tables and Spanning Tree information stored in switches to propagate andprobe for vulnerable nodes until the enterprise network is covered.[6]Most security experts regard all worms as malware, whatever their payload ortheir writers intentions.Protecting against dangerous computer wormsWorms spread by exploiting vulnerabilities in operating systems. Vendors withsecurity problems supply regular security updates[7] (see "Patch Tuesday"), andif these are installed to a machine then the majority of worms are unable tospread to it. If a vulnerability is disclosed before the security patch released bythe vendor, a Zero-day attack is possible.Users need to be wary of opening unexpected email,[8] and should not runattached files or programs, or visit web sites that are linked to such emails.However, as with the ILOVEYOU worm, and with the increased growth andefficiency of phishing attacks, it remains possible to trick the end-user intorunning a malicious code.
  16. 16. Anti-virus and anti-spyware software are helpful, but must be kept up-to-date withnew pattern files at least every few days. The use of a firewall is alsorecommended.In the April–June, 2008, issue of IEEE Transactions on Dependable and SecureComputing, computer scientists describe a potential new way to combat internetworms. The researchers discovered how to contain the kind of worm that scansthe Internet randomly, looking for vulnerable hosts to infect. They found that thekey is for software to monitor the number of scans that machines on a networksends out. When a machine starts sending out too many scans, it is a sign that ithas been infected, allowing administrators to take it off line and check it forviruses.[9][10]Mitigation techniquesACLs in routers and switchesPacket-filtersNullroutingTCP Wrapper/libwrap enabled network service daemonsHistoryThe actual term "worm" was first used in John Brunners 1975 novel, TheShockwave Rider. In that novel, Nichlas Haflinger designs and sets off a data-gathering worm in an act of revenge against the powerful men who run a nationalelectronic information web that induces mass conformity. "You have the biggest-ever worm loose in the net, and it automatically sabotages any attempt to monitorit... Theres never been a worm with that tough a head or that long a tail!"[11]On November 2, 1988, Robert Tappan Morris, a Cornell University computerscience graduate student, unleashed what became known as the Morris worm,disrupting perhaps 10% of the computers then on the Internet[12][13] andprompting the formation of the CERT Coordination Center[14] and Phage mailinglist.[15] Morris himself became the first person tried and convicted under the1986 Computer Fraud and Abuse Act.[16]See alsoComputer surveillanceComputer virusHelpful wormSpamTimeline of notable computer viruses and wormsTrojan horse (computing)XSS WormReferences^ Ray, Tiernan (February 18, 2004). "Business & Technology: E-mail virusesblamed as spam rises sharply". The Seattle Times.^ McWilliams, Brian (October 9, 2003). "Cloaking Device Made for Spammers".Wired.
  17. 17. ^ "Unavailable".^ "Uncovered: Trojans as Spam Robots". heise online.^ "Hacker threats to bookies probed". BBC News. February 23, 2004.^ Al-Salloum, Z.; et al. (2010). "A Link-Layer-Based Self-Replicating VulnerabilityDiscovery Agent". ISCC 2010.. IEEE^ USN list | Ubuntu^ Information on the Nimda Worm^ Sellke, S. H.; Shroff, N. B.; Bagchi, S. (2008). "Modeling and AutomatedContainment of Worms". IEEE Transactions on Dependable and SecureComputing 5 (2): 71–86.^ "A New Way to Protect Computer Networks from Internet Worms". Newswise.Retrieved June 5, 2008.^ Brunner, John (1975). The Shockwave Rider. New York: Ballantine Books.ISBN 0060105593.^ "The Submarine".^ During the Morris appeal process, the U.S. Court of Appeals estimated the costof removing the virus from each installation was in the range of $200–53,000.Possibly based on these numbers, Harvard spokesman Clifford Stoll estimatedthe total economic impact was between $100,000–10,000,000. "Bs2.comhomepage". Retrieved 20 November 2010.^ "Security of the Internet". CERT/CC.^ "Phage mailing list".^ Dressler, J. (2007). "United States v. Morris". Cases and Materials on CriminalLaw. St. Paul, MN: Thomson/West. ISBN 9780314177193.External linksThe Wildlist - List of viruses and worms in the wild (i.e. regularly encountered byanti-virus companies)Jose Nazario discusses worms - Worms overview by a famous securityresearcher.Computer worm suspect in courtVernalex.coms Malware Removal Guide - Guide for understanding, removingand preventing worm infectionsJohn Shoch, Jon Hupp "The "Worm" Programs - Early Experience with aDistributed Computation"RFC 1135 The Helminthiasis of the InternetSurfing Safe - A site providing tips/advice on preventing and removing viruses.Computer Worms InformationThe Case for Using Layered Defenses to Stop WormsWorm Evolution Paper from Digital Threat[hide]v · d · eMalwareInfectious malwareComputer virus · Macro virus · List of computer viruses · Computer worm · List ofcomputer worms · Timeline of notable computer viruses and wormsConcealmentTrojan horse · Rootkit · Backdoor
  18. 18. Malware for profitPrivacy-invasive software · Spyware · Botnet · Keystroke logging · Web threats ·Fraudulent dialer · MalbotBy operating systemLinux malware · Palm OS viruses · Mobile virusProtectionAntivirus software · Defensive computing · Firewall · Intrusion detection system ·Data loss prevention softwareLaw enforcementComputer surveillance · Operation: Bot Roast TrojanFrom Wikipedia, the free encyclopediaAn email box folder littered with spam messages.Spam is the use of electronic messaging systems (including most broadcastmedia, digital delivery systems) to send unsolicited bulk messagesindiscriminately. While the most widely recognized form of spam is e-mail spam,the term is applied to similar abuses in other media: instant messaging spam,Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam,online classified ads spam, mobile phone messaging spam, Internet forum spam,junk fax transmissions, social networking spam, television advertising and filesharing network spam.Spamming remains economically viable because advertisers have no operatingcosts beyond the management of their mailing lists, and it is difficult to holdsenders accountable for their mass mailings. Because the barrier to entry is solow, spammers are numerous, and the volume of unsolicited mail has becomevery high. In the year 2011 the estimated figure for spam messages are aroundseven trillion. The costs, such as lost productivity and fraud, are borne by thepublic and by Internet service providers, which have been forced to add extracapacity to cope with the deluge. Spamming has been the subject of legislation inmany jurisdictions.[1]People who create electronic spam are called spammers.[2]Contents [hide]1 In different media1.1 E-mail1.2 Instant Messaging1.3 Newsgroup and forum1.4 Mobile phone1.5 Online game messaging1.6 Spam targeting search engines (spamdexing)
  19. 19. 1.7 Blog, wiki, and guestbook1.8 Spam targeting video sharing sites1.9 SPIT2 Noncommercial forms3 Geographical origins4 History4.1 Pre-Internet4.2 Etymology4.3 History of Internet forms5 Trademark issues6 Cost Benefit Analyses6.1 General costs7 In crime8 Political issues9 Court cases9.1 United States9.2 United Kingdom9.3 New Zealand10 Newsgroups11 See also12 References12.1 Notes12.2 Sources13 Further reading14 External linksIn different mediaE-mailMain article: E-mail spamE-mail spam, known as unsolicited bulk Email (UBE), junk mail, or unsolicitedcommercial email (UCE), is the practice of sending unwanted e-mail messages,frequently with commercial content, in large quantities to an indiscriminate set ofrecipients. Spam in e-mail started to become a problem when the Internet wasopened up to the general public in the mid-1990s. It grew exponentially over thefollowing years, and today composes some 80 to 85% of all the email in theworld, by a "conservative estimate".[3] Pressure to make e-mail spam illegal hasbeen successful in some jurisdictions, but less so in others. Spammers takeadvantage of this fact, and frequently outsource parts of their operations tocountries where spamming will not get them into legal trouble.Increasingly, e-mail spam today is sent via "zombie networks", networks of virus-or worm-infected personal computers in homes and offices around the globe;many modern worms install a backdoor which allows the spammer access to thecomputer and use it for malicious purposes. This complicates attempts to controlthe spread of spam, as in many cases the spam doesnt even originate from thespammer. In November 2008 an ISP, McColo, which was providing service tobotnet operators, was depeered and spam dropped 50%-75% Internet-wide. At
  20. 20. the same time, it is becoming clear that malware authors, spammers, andphishers are learning from each other, and possibly forming various kinds ofpartnerships.[citation needed]An industry of e-mail address harvesting is dedicated to collecting emailaddresses and selling compiled databases.[4] Some of these address harvestingapproaches rely on users not reading the fine print of agreements, resulting inthem agreeing to send messages indiscriminately to their contacts. This is acommon approach in social networking spam such as that generated by thesocial networking site Quechup.[5]Instant MessagingMain article: Messaging spamInstant Messaging spam makes use of instant messaging systems. Although lessubiquitous than its e-mail counterpart, according to a report from FerrisResearch, 500 million spam IMs were sent in 2003, twice the level of 2002. Asinstant messaging tends to not be blocked by firewalls, it is an especially usefulchannel for spammers. This is very common on many instant messaging systemsuch as Skype.Newsgroup and forumMain article: Newsgroup spamNewsgroup spam is a type of spam where the targets are Usenet newsgroups.Spamming of Usenet newsgroups actually pre-dates e-mail spam. Usenetconvention defines spamming as excessive multiple posting, that is, the repeatedposting of a message (or substantially similar messages). The prevalence ofUsenet spam led to the development of the Breidbart Index as an objectivemeasure of a messages "spamminess".Main article: Forum spamForum spam is the creating of messages that are advertisements or otherwiseunwanted on Internet forums. It is generally done by automated spambots. Mostforum spam consists of links to external sites, with the dual goals of increasingsearch engine visibility in highly competitive areas such as weight loss,pharmaceuticals, gambling, pornography, real estate or loans, and generatingmore traffic for these commercial websites. Some of these links contain code totrack the spambots identity if a sale goes through, when the spammer behind thespambot works on commission.Mobile phoneMain article: Mobile phone spamMobile phone spam is directed at the text messaging service of a mobile phone.This can be especially irritating to customers not only for the inconvenience butalso because of the fee they may be charged per text message received in somemarkets. The term "SpaSMS" was coined at the adnews website Adland in 2000to describe spam SMS.Online game messagingMany online games allow players to contact each other via player-to-playermessaging, chat rooms, or public discussion areas. What qualifies as spamvaries from game to game, but usually this term applies to all forms of messageflooding, violating the terms of service contract for the website. This is particularly
  21. 21. common in MMORPGs where the spammers are trying to sell game-related"items" for real-world money, chiefly among these items is in-game currency.This kind of spamming is also called Real World Trading (RWT). In the popularMMORPG Runescape, it is common for spammers to advertise sites that sellgold in multiple methods of spam. They send spam via the in-game privatemessaging system, via using emotes to gain attention, and by yelling publicly toeveryone in the area.Spam targeting search engines (spamdexing)Main article: SpamdexingSpamdexing (a portmanteau of spamming and indexing) refers to a practice onthe World Wide Web of modifying HTML pages to increase the chances of thembeing placed high on search engine relevancy lists. These sites use "black hatsearch engine optimization (SEO) techniques" to deliberately manipulate theirrank in search engines. Many modern search engines modified their searchalgorithms to try to exclude web pages utilizing spamdexing tactics. For example,the search bots will detect repeated keywords as spamming by using a grammaranalysis. If a website owner is found to have spammed the webpage to falselyincrease its page rank, the website may be penalized by search engines.Blog, wiki, and guestbookMain article: Spam in blogsBlog spam, or "blam" for short, is spamming on weblogs. In 2003, this type ofspam took advantage of the open nature of comments in the blogging softwareMovable Type by repeatedly placing comments to various blog posts thatprovided nothing more than a link to the spammers commercial web site.[6]Similar attacks are often performed against wikis and guestbooks, both of whichaccept user contributions.Spam targeting video sharing sitesVideo sharing sites, such as YouTube, are now being frequently targeted byspammers. The most common technique involves people (or spambots) postinglinks to sites, most likely pornographic or dealing with online dating, on thecomments section of random videos or peoples profiles. Another frequently usedtechnique is using bots to post messages on random users profiles to a spamaccounts channel page, along with enticing text and images, usually of asexually suggestive nature. These pages may include their own or other usersvideos, again often suggestive. The main purpose of these accounts is to drawpeople to their link in the home page section of their profile. YouTube hasblocked the posting of such links. In addition, YouTube has implemented aCAPTCHA system that makes rapid posting of repeated comments much moredifficult than before, because of abuse in the past by mass-spammers who wouldflood peoples profiles with thousands of repetitive comments.Yet another kind is actual video spam, giving the uploaded movie a name anddescription with a popular figure or event which is likely to draw attention, orwithin the video has a certain image timed to come up as the videos thumbnailimage to mislead the viewer. The actual content of the video ends up beingtotally unrelated, a Rickroll, sometimes offensive, or just features on-screen textof a link to the site being promoted.[7] Others may upload videos presented in an
  22. 22. infomercial-like format selling their product which feature actors and paidtestimonials, though the promoted product or service is of dubious quality andwould likely not pass the scrutiny of a standards and practices department at atelevision station or cable network.SPITSPIT (SPam over Internet Telephony) is VoIP (Voice over Internet Protocol)spam, usually using SIP (Session Initiation Protocol).Noncommercial formsE-mail and other forms of spamming have been used for purposes other thanadvertisements. Many early Usenet spams were religious or political. SerdarArgic, for instance, spammed Usenet with historical revisionist screeds. Anumber of evangelists have spammed Usenet and e-mail media with preachingmessages. A growing number of criminals are also using spam to perpetratevarious sorts of fraud,[8] and in some cases have used it to lure people tolocations where they have been kidnapped, held for ransom, and even murdered.[9]Geographical originsA 2009 Cisco Systems report lists the origin of spam by country as follows:[10]Rank Country Spam messages per year (in trillions)1 Brazil 7.72 United States 6.63 India 3.64 South Korea 3.15 Turkey 2.66 Vietnam 2.57 China 2.48 Poland 2.49 Russia 2.310 Argentina 1.5HistoryPre-InternetIn the late 19th Century Western Union allowed telegraphic messages on itsnetwork to be sent to multiple destinations. The first recorded instance of a massunsolicited commercial telegram is from May 1864.[11] Up until the GreatDepression wealthy North American residents would be deluged with nebulousinvestment offers. This problem never fully emerged in Europe to the degree thatit did in the Americas, because telegraphy was regulated by national post officesin the European region.EtymologyAccording to the Internet Society and other sources, the term spam is derivedfrom the 1970 Spam sketch of the BBC television comedy series "Monty PythonsFlying Circus".[12] The sketch is set in a cafe where nearly every item on themenu includes Spam canned luncheon meat. As the waiter recites the Spam-
  23. 23. filled menu, a chorus of Viking patrons drowns out all conversations with a songrepeating "Spam, Spam, Spam, Spam... lovely Spam! wonderful Spam!", hence"Spamming" the dialogue.[13] The excessive amount of Spam mentioned in thesketch is a reference to the preponderance of imported canned meat products inthe United Kingdom, particularly corned beef from Argentina, in the years afterWorld War II, as the country struggled to rebuild its agricultural base. Spamcaptured a large slice of the British market within lower economic classes andbecame a byword among British children of the 1960s for low-grade fodder dueto its commonality, monotonous taste and cheap price - hence the humour of thePython sketch.In the 1980s the term was adopted to describe certain abusive users whofrequented BBSs and MUDs, who would repeat "Spam" a huge number of timesto scroll other users text off the screen.[14] In early Chat rooms services likePeopleLink and the early days of AOL, they actually flooded the screen withquotes from the Monty Python Spam sketch. With internet connections overphone lines, typically running at 1200 or even 300 bit/s, it could take anenormous amount of time for a spammy logo, drawn in ASCII art to scroll tocompletion on a viewers terminal. Sending an irritating, large, meaningless blockof text in this way was called spamming. This was used as a tactic by insiders ofa group that wanted to drive newcomers out of the room so the usualconversation could continue. It was also used to prevent members of rival groupsfrom chatting—for instance, Star Wars fans often invaded Star Trek chat rooms,filling the space with blocks of text until the Star Trek fans left.[15] This act,previously called flooding or trashing, came to be known as spamming.[16] Theterm was soon applied to a large amount of text broadcast by many users.It later came to be used on Usenet to mean excessive multiple posting—therepeated posting of the same message. The unwanted message would appear inmany if not all newsgroups, just as Spam appeared in nearly all the menu itemsin the Monty Python sketch. The first usage of this sense was by Joel Furr[17] inthe aftermath of the ARMM incident of March 31, 1993, in which a piece ofexperimental software released dozens of recursive messages onto thenews.admin.policy newsgroup.[18] This use had also become established—tospam Usenet was flooding newsgroups with junk messages. The word was alsoattributed to the flood of "Make Money Fast" messages that clogged manynewsgroups during the 1990s.[citation needed] In 1998, the New OxfordDictionary of English, which had previously only defined "spam" in relation to thetrademarked food product, added a second definition to its entry for "spam":"Irrelevant or inappropriate messages sent on the Internet to a large number ofnewsgroups or users."[19]There are several popular false etymologies of the word "spam". One,promulgated by early spammers Laurence Canter and Martha Siegel, is that"spamming" is what happens when one dumps a can of Spam luncheon meatinto a fan blade.[citation needed] Some others are the backronym stupidpointless annoying messages."[citation needed] There was also an effort todifferentiate between types of spam. That which was sent indiscriminately to anye-mail address was true spam while that which was targeted to more likely
  24. 24. prospects, although just as unsolicited, was called velveeta (after the cheeseproduct). But this latter term didnt persist.History of Internet formsThe earliest documented spam was a message advertising the availability of anew model of Digital Equipment Corporation computers sent to 393 recipients onARPANET in 1978, by Gary Thuerk.[17][20][21] The term "spam" for this practicehad not yet been applied. Spamming had been practiced as a prank byparticipants in multi-user dungeon games, to fill their rivals accounts withunwanted electronic junk.[21] The first known electronic chain letter, titled MakeMoney Fast, was released in 1988.The first major commercial spam incident started on March 5, 1994, when ahusband and wife team of lawyers, Laurence Canter and Martha Siegel, beganusing bulk Usenet posting to advertise immigration law services. The incidentwas commonly termed the "Green Card spam", after the subject line of thepostings. Defiant in the face of widespread condemnation, the attorneys claimedtheir detractors were hypocrites or "zealouts", claimed they had a free speechright to send unwanted commercial messages, and labeled their opponents "anti-commerce radicals." The couple wrote a controversial book entitled How to Makea Fortune on the Information Superhighway.[21]Later that year a poster operating under the alias Serdar Argic postedantagonistic messages denying the Armenian Genocide to tens of thousands ofUsenet discussions that had been searched for the word Turkey. Within a fewyears, the focus of spamming (and anti-spam efforts) moved chiefly to e-mail,where it remains today.[14] Arguably, the aggressive email spamming by anumber of high-profile spammers such as Sanford Wallace of Cyber Promotionsin the mid-to-late 1990s contributed to making spam predominantly an emailphenomenon in the public mind.[citation needed] By 2009, the majority of spamsent around the world was in the English language; spammers began usingautomatic translation services to send spam in other languages.[22]Trademark issuesHormel Foods Corporation, the maker of Spam luncheon meat, does not objectto the Internet use of the term "spamming". However, they did ask that thecapitalized word "Spam" be reserved to refer to their product and trademark.[23]By and large, this request is obeyed in forums which discuss spam. In HormelFoods v SpamArrest, Hormel attempted to assert its trademark rights againstSpamArrest, a software company, from using the mark "spam", since Hormelowns the trademark. In a dilution claim, Hormel argued that Spam Arrests use ofthe term "spam" had endangered and damaged "substantial goodwill and goodreputation" in connection with its trademarked lunch meat and related products.Hormel also asserts that Spam Arrests name so closely resembles its luncheonmeat that the public might become confused, or might think that Hormelendorses Spam Arrests products.Hormel did not prevail. Attorney Derek Newman responded on behalf of SpamArrest: "Spam has become ubiquitous throughout the world to describeunsolicited commercial e-mail. No company can claim trademark rights on a
  25. 25. generic term." Hormel stated on its website: "Ultimately, we are trying to avoidthe day when the consuming public asks, Why would Hormel Foods name itsproduct after junk email?".[24]Hormel also made two attempts that were dismissed in 2005 to revoke the marks"SPAMBUSTER"[25] and Spam Cube.[26] Hormels Corporate Attorney MelanieJ. Neumann also sent SpamCops Julian Haight a letter on August 27, 1999requesting that he delete an objectionable image (a can of Hormels Spamluncheon meat product in a trash can), change references to UCE spam to alllower case letters, and confirm his agreement to do so.[27]Cost Benefit AnalysesThe European Unions Internal Market Commission estimated in 2001 that "junke-mail" cost Internet users €10 billion per year worldwide.[28] The Californialegislature found that spam cost United States organizations alone more than$13 billion in 2007, including lost productivity and the additional equipment,software, and manpower needed to combat the problem.[29] Spams directeffects include the consumption of computer and network resources, and the costin human time and attention of dismissing unwanted messages.[30]In addition, spam has costs stemming from the kinds of spam messages sent,from the ways spammers send them, and from the arms race betweenspammers and those who try to stop or control spam. In addition, there are theopportunity cost of those who forgo the use of spam-afflicted systems. There arethe direct costs, as well as the indirect costs borne by the victims—both thoserelated to the spamming itself, and to other crimes that usually accompany it,such as financial theft, identity theft, data and intellectual property theft, virus andother malware infection, child pornography, fraud, and deceptive marketing.The cost to providers of search engines is not insignificant: "The secondaryconsequence of spamming is that search engine indexes are inundated withuseless pages, increasing the cost of each processed query".[2] The methods ofspammers are likewise costly. Because spamming contravenes the vast majorityof ISPs acceptable-use policies, most spammers have for many years gone tosome trouble to conceal the origins of their spam. E-mail, Usenet, and instant-message spam are often sent through insecure proxy servers belonging tounwilling third parties. Spammers frequently use false names, addresses, phonenumbers, and other contact information to set up "disposable" accounts atvarious Internet service providers. In some cases, they have used falsified orstolen credit card numbers to pay for these accounts. This allows them to quicklymove from one account to the next as each one is discovered and shut down bythe host ISPs.The costs of spam also include the collateral costs of the struggle betweenspammers and the administrators and users of the media threatened byspamming. [31] Many users are bothered by spam because it impinges upon theamount of time they spend reading their e-mail. Many also find the content ofspam frequently offensive, in that pornography is one of the most frequentlyadvertised products. Spammers send their spam largely indiscriminately, sopornographic ads may show up in a work place e-mail inbox—or a childs, the
  26. 26. latter of which is illegal in many jurisdictions. Recently, there has been anoticeable increase in spam advertising websites that contain child pornography.Some spammers argue that most of these costs could potentially be alleviated byhaving spammers reimburse ISPs and persons for their material.[citation needed]There are three problems with this logic: first, the rate of reimbursement theycould credibly budget is not nearly high enough to pay the direct costs[citationneeded], second, the human cost (lost mail, lost time, and lost opportunities) isbasically unrecoverable, and third, spammers often use stolen bank accountsand credit cards to finance their operations, and would conceivably do so to payoff any fines imposed.E-mail spam exemplifies a tragedy of the commons: spammers use resources(both physical and human), without bearing the entire cost of those resources. Infact, spammers commonly do not bear the cost at all. This raises the costs foreveryone. In some ways spam is even a potential threat to the entire e-mailsystem, as operated in the past. Since e-mail is so cheap to send, a tiny numberof spammers can saturate the Internet with junk mail. Although only a tinypercentage of their targets are motivated to purchase their products (or fall victimto their scams), the low cost may provide a sufficient conversion rate to keep thespamming alive. Furthermore, even though spam appears not to be economicallyviable as a way for a reputable company to do business, it suffices forprofessional spammers to convince a tiny proportion of gullible advertisers that itis viable for those spammers to stay in business. Finally, new spammers go intobusiness every day, and the low costs allow a single spammer to do a lot of harmbefore finally realizing that the business is not profitable.Some companies and groups "rank" spammers; spammers who make the newsare sometimes referred to by these rankings.[32][33] The secretive nature ofspamming operations makes it difficult to determine how proliferated anindividual spammer is, thus making the spammer hard to track, block or avoid.Also, spammers may target different networks to different extents, depending onhow successful they are at attacking the target. Thus considerable resources areemployed to actually measure the amount of spam generated by a single personor group. For example, victims that use common anti-spam hardware, softwareor services provide opportunities for such tracking. Nevertheless, such rankingsshould be taken with a grain of salt.General costsIn all cases listed above, including both commercial and non-commercial, "spamhappens" because of a positive Cost-benefit analysis result if the cost torecipients is excluded as an externality the spammer can avoid paying.Cost is the combination ofOverhead: The costs and overhead of electronic spamming include bandwidth,developing or acquiring an email/wiki/blog spam tool, taking over or acquiring ahost/zombie, etc.Transaction cost: The incremental cost of contacting each additional recipientonce a method of spamming is constructed, multiplied by the number ofrecipients. (see CAPTCHA as a method of increasing transaction costs)Risks: Chance and severity of legal and/or public reactions, including damages
  27. 27. and punitive damagesDamage: Impact on the community and/or communication channels beingspammed (see Newsgroup spam)Benefit is the total expected profit from spam, which may include anycombination of the commercial and non-commercial reasons listed above. It isnormally linear, based on the incremental benefit of reaching each additionalspam recipient, combined with the conversion rate. The conversion rate forbotnet-generated spam has recently been measured to be around one in12,000,000 for pharmaceutical spam and one in 200,000 for infection sites asused by the Storm botnet.[34] They specifically say in the paper "After 26 days,and almost 350 million e-mail messages, only 28 sales resulted".Spam is prevalent on the Internet because the transaction cost of electroniccommunications is radically less than any alternate form of communication, faroutweighing the current potential losses, as seen by the amount of spamcurrently in existence. Spam continues to spread to new forms of electroniccommunication as the gain (number of potential recipients) increases to levelswhere the cost/benefit becomes positive. Spam has most recently evolved toinclude wikispam and blogspam as the levels of readership increase to levelswhere the overhead is no longer the dominating factor. According to the aboveanalysis, spam levels will continue to increase until the cost/benefit analysis isbalanced[citation needed].In crimeSpam can be used to spread computer viruses, trojan horses or other malicioussoftware. The objective may be identity theft, or worse (e.g., advance fee fraud).Some spam attempts to capitalize on human greed whilst other attempts to usethe victims inexperience with computer technology to trick them (e.g., phishing).On May 31, 2007, one of the worlds most prolific spammers, Robert AlanSoloway, was arrested by U.S. authorities.[35] Described as one of the top tenspammers in the world, Soloway was charged with 35 criminal counts, includingmail fraud, wire fraud, e-mail fraud, aggravated identity theft and moneylaundering.[35] Prosecutors allege that Soloway used millions of "zombie"computers to distribute spam during 2003.[citation needed] This is the first casein which U.S. prosecutors used identity theft laws to prosecute a spammer fortaking over someone elses Internet domain name.[citation needed]Political issuesSpamming remains a hot discussion topic. In 2004, the seized Porsche of anindicted spammer was advertised on the Internet;[36] this revealed the extent ofthe financial rewards available to those who are willing to commit duplicitous actsonline. However, some of the possible means used to stop spamming may leadto other side effects, such as increased government control over the Internet,loss of privacy, barriers to free expression, and the commercialization of e-mail.[citation needed]One of the chief values favored by many long-time Internet users and experts, aswell as by many members of the public, is the free exchange of ideas. Many
  28. 28. have valued the relative anarchy of the Internet, and bridle at the idea ofrestrictions placed upon it.[citation needed] A common refrain from spam-fightersis that spamming itself abridges the historical freedom of the Internet, byattempting to force users to carry the costs of material which they would notchoose.[citation needed]An ongoing concern expressed by parties such as the Electronic FrontierFoundation and the ACLU has to do with so-called "stealth blocking", a term forISPs employing aggressive spam blocking without their users knowledge. Thesegroups concern is that ISPs or technicians seeking to reduce spam-related costsmay select tools which (either through error or design) also block non-spam e-mail from sites seen as "spam-friendly". SPEWS is a common target of thesecriticisms. Few object to the existence of these tools; it is their use in filtering themail of users who are not informed of their use which draws fire.[citation needed]Some see spam-blocking tools as a threat to free expression—and laws againstspamming as an untoward precedent for regulation or taxation of e-mail and theInternet at large. Even though it is possible in some jurisdictions to treat somespam as unlawful merely by applying existing laws against trespass andconversion, some laws specifically targeting spam have been proposed. In 2004,United States passed the CAN-SPAM Act of 2003 which provided ISPs with toolsto combat spam. This act allowed Yahoo! to successfully sue Eric Head,reportedly one of the biggest spammers in the world, who settled the lawsuit forseveral thousand U.S. dollars in June 2004. But the law is criticized by many fornot being effective enough. Indeed, the law was supported by some spammersand organizations which support spamming, and opposed by many in the anti-spam community. Examples of effective anti-abuse laws that respect free speechrights include those in the U.S. against unsolicited faxes and phone calls, andthose in Australia and a few U.S. states against spam.[citation needed]In November 2004, Lycos Europe released a screen saver called make LOVEnot SPAM which made Distributed Denial of Service attacks on the spammersthemselves. It met with a large amount of controversy and the initiative ended inDecember 2004.[citation needed]While most countries either outlaw or at least ignore spam, Bulgaria is the firstand until now only one to partially legalize it. According to recent changes in theBulgarian E-Commerce act anyone can send spam to mailboxes, owned bycompany or organization, as long as there is warning that this may be unsolicitedcommercial email in the message body. The law contains many other inadequatetexts - for example the creation of a nationwide public electronic register of emailaddresses that do not want to receive spam, something valuable only as sourcefor e-mail address harvesting.Anti-spam policies may also be a form of disguised censorship, a way to banaccess or reference to questioning alternative forums or blogs by an institution.This form of occult censorship is mainly used by private companies when theycan not muzzle criticism by legal ways.[37]Court casesSee also: E-mail spam legislation by country
  29. 29. United StatesSanford Wallace and Cyber Promotions were the target of a string of lawsuits,many of which were settled out of court, up through the famous 1998 Earthlinksettlement[citation needed]which put Cyber Promotions out of business. AttorneyLaurence Canter was disbarred by the Tennessee Supreme Court in 1997 forsending prodigious amounts of spam advertising his immigration law practice. In2005, Jason Smathers, a former America Online employee, pled guilty tocharges of violating the CAN-SPAM Act. In 2003, he sold a list of approximately93 million AOL subscriber e-mail addresses to Sean Dunaway who, in turn, soldthe list to spammers.[38][39]In 2007, Robert Soloway lost a case in a federal court against the operator of asmall Oklahoma-based Internet service provider who accused him of spamming.U.S. Judge Ralph G. Thompson granted a motion by plaintiff Robert Braver for adefault judgment and permanent injunction against him. The judgment includes astatutory damages award of $10,075,000 under Oklahoma law.[40]In June 2007, two men were convicted of eight counts stemming from sendingmillions of e-mail spam messages that included hardcore pornographic images.Jeffrey A. Kilbride, 41, of Venice, California was sentenced to six years in prison,and James R. Schaffer, 41, of Paradise Valley, Arizona, was sentenced to 63months. In addition, the two were fined $100,000, ordered to pay $77,500 inrestitution to AOL, and ordered to forfeit more than $1.1 million, the amount ofillegal proceeds from their spamming operation.[41] The charges includedconspiracy, fraud, money laundering, and transportation of obscene materials.The trial, which began on June 5, was the first to include charges under the CAN-SPAM Act of 2003, according to a release from the Department of Justice. Thespecific law that prosecutors used under the CAN-Spam Act was designed tocrack down on the transmission of pornography in spam.[42]In 2005, Scott J. Filary and Donald E. Townsend of Tampa, Florida were sued byFlorida Attorney General Charlie Crist for violating the Florida Electronic MailCommunications Act.[43] The two spammers were required to pay $50,000 USDto cover the costs of investigation by the state of Florida, and a $1.1 millionpenalty if spamming were to continue, the $50,000 was not paid, or the financialstatements provided were found to be inaccurate. The spamming operation wassuccessfully shut down.[44]Edna Fiedler, 44, of Olympia, Washington, on June 25, 2008, pleaded guilty in aTacoma court and was sentenced to 2 years imprisonment and 5 years ofsupervised release or probation in an Internet $1 million "Nigerian check scam."She conspired to commit bank, wire and mail fraud, against US citizens,specifically using Internet by having had an accomplice who shipped counterfeitchecks and money orders to her from Lagos, Nigeria, last November. Fiedlershipped out $ 609,000 fake check and money orders when arrested andprepared to send additional $ 1.1 million counterfeit materials. Also, the U.S.Postal Service recently intercepted counterfeit checks, lottery tickets and eBayoverpayment schemes with a face value of $2.1 billion.[45][46]United KingdomIn the first successful case of its kind, Nigel Roberts from the Channel Islands
  30. 30. won £270 against Media Logistics UK who sent junk e-mails to his personalaccount.[47]In January 2007, a Sheriff Court in Scotland awarded Mr. Gordon Dick £750 (thethen maximum sum which could be awarded in a Small Claim action) plusexpenses of £618.66, a total of £1368.66 against Transcom Internet ServicesLtd.[48] for breaching anti-spam laws.[49] Transcom had been legallyrepresented at earlier hearings but were not represented at the proof, so GordonDick got his decree by default. It is the largest amount awarded in compensationin the United Kingdom since Roberts -v- Media Logistics case in 2005 above, butit is not known if Mr Dick ever received anything. (An image of Media Logisticscheque is shown on Roberts website[50] ) Both Roberts and Dick are well knownfigures in the British Internet industry for other things. Dick is currently InterimChairman of Nominet UK (the manager of .UK and .CO.UK) while Roberts isCEO of CHANNELISLES.NET (manager of .GG and .JE).Despite the statutory tort that is created by the Regulations implementing the ECDirective, few other people have followed their example. As the Courts engage inactive case management, such cases would probably now be expected to besettled by mediation and payment of nominal damages.New ZealandIn October 2008, a vast international internet spam operation run from NewZealand was cited by American authorities as one of the world’s largest, and fora time responsible for up to a third of all unwanted emails. In a statement the USFederal Trade Commission (FTC) named Christchurch’s Lance Atkinson as oneof the principals of the operation. New Zealand’s Internal Affairs announced ithad lodged a $200,000 claim in the High Court against Atkinson and his brotherShane Atkinson and courier Roland Smits, after raids in Christchurch. Thismarked the first prosecution since the Unsolicited Electronic Messages Act(UEMA) was passed in September 2007. The FTC said it had received morethan three million complaints about spam messages connected to this operation,and estimated that it may be responsible for sending billions of illegal spammessages. The US District Court froze the defendants’ assets to preserve themfor consumer redress pending trial.[51] U.S. co-defendant Jody Smith forfeitedmore than $800,000 and faces up to five years in prison for charges to which heplead guilty.[52] also Internet portalAddress munging (avoidance technique)Advance fee fraud (Nigerian spam)Anti-spam techniquesBacn (electronic)E-mail fraudIdentity theft
  31. 31. Image spamInternet TrollJob scamsJunk mailList of spammersMalwareNetwork Abuse ClearinghousePhishingScamScad (scam ad)Social networking spamSORBSSpamSpam LitSpamCopSpamigationSPIT (SPam over Internet Telephony)SpoetrySporgeryVirus (computer)VishingHistoryHoward CarmackMake money fastSanford WallaceSpam KingUsenet Death PenaltyUUnetReferencesNotes^ The Spamhaus Project - The Definition Of Spam^ a b Gyongyi, Zoltan; Garcia-Molina, Hector (2005). "Web spam taxonomy".Proceedings of the First International Workshop on Adversarial InformationRetrieval on the Web (AIRWeb), 2005 in The 14th International World Wide WebConference (WWW 2005) May 10, (Tue)-14 (Sat), 2005, Nippon ConventionCenter (Makuhari Messe), Chiba, Japan.. New York, N.Y.: ACM Press. ISBN1-59593-046-9^ "?".^ FileOn List Builder-Extract URL,MetaTags,Email,Phone,Fax from www-Optimized Webcrawler^ Saul Hansell Social network launches worldwide spam campaign New YorkTimes, September 13, 2007^ The (Evil) Genius of Comment Spammers - Wired Magazine, March 2004^ Fabrício Benevenuto, Tiago Rodrigues, Virgílio Almeida, Jussara Almeida andMarcos Gonçalves. Detecting Spammers and Content Promoters in Online Video
  32. 32. Social Networks. In ACM SIGIR Conference, Boston, MA, USA, July 2009..^ See: Advance fee fraud^ SA cops, Interpol probe murder -, 2004-12-31^ Brasil assume a liderança do spam mundial em 2009, diz Cisco (Portuguese)^ "Getting the message, at last". The Economist. 2007-12-14.^ "RFC 2635 - DONx27T SPEW A Set of Guidelines for Mass UnsolicitedMailings and Postings (spam*):". Retrieved 2010-09-29.^ "The Origin of the word Spam:". Retrieved 2010-09-20.^ a b Origin of the term "spam" to mean net abuse^ The Origins of Spam in Star Trek chat rooms^ Spamming? ( - Google Groups USENET archive, 1990-09-26^ a b At 30, Spam Going Nowhere Soon - Interviews with Gary Thuerk and JoelFurr^ Darren Waters (31 march 2008). "Spam blights e-mail 15 years on" Retrieved 26 August 2010.^ "Oxford dictionary adds Net terms" on^ Reaction to the DEC Spam of 1978^ a b c Tom Abate (May 3, 2008). "A very unhappy birthday to spam, age 30".San Francisco Chronicle.^ Danchev, Dancho. "Spammers go multilingual, use automatic translationservices." ZDNet. July 28, 2009. Retrieved on August 31, 2009.^ "?"., Official SPAM Website^ Hormel Foods v SpamArrest, Motion for Summary Judgment, RedactedVersion (PDF)^ Hormel Foods Corpn v Antilles Landscape Investments NV (2005) EWHC 13(Ch)[dead link]^ "Hormel Foods Corporation v. Spam Cube, Inc". United States Patent andTrademark Office. Retrieved 2008-02-12.^ Letter from Hormels Corporate Attorney Melanie J. Neumann to SpamCopsJulian Haight^ "Data protection: "Junk" e-mail costs internet users 10 billion a year worldwide -Commission study"^ California business and professions code^ Spam Cost Calculator: Calculate enterprise spam cost?^ Thank the Spammers - William R. James 2003-03-10^ Spamhaus "TOP 10 spam service ISPs"^ The 10 Worst ROKSO Spammers^ Kanich, C.; C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson and S.Savage (2008-10-28). "Spamalytics: An Empirical Analysis of Spam MarketingConversion" (PDF). Proceedings of Conference on Computer andCommunications Security (CCS). Alexandria, VA, USA. Retrieved 2008-11-05.^ a b Alleged Seattle Spammer arrested - CNET^^ See for instance the black list of the French wikipedia encyclopedia^ U.S. v Jason Smathers and Sean Dunaway, amended complaint, US DistrictCourt for the Southern District of New York (2003). Retrieved 7 March 2007, from
  33. 33. "?".^ Ex-AOL employee pleads guilty in spam case. (2005, February 4). CNN.Retrieved 7 March 2007, from "Ex-AOL employee pleads guilty in spam case" February 5, 2005. Retrieved 27 August 2010.^ Braver v. Newport Internet Marketing Corporation et al. -U.S. District Court -Western District of Oklahoma (Oklahoma City), 2005-02-22^ "Two Men Sentenced for Running International Pornographic SpammingBusiness". United States Department of Justice. October 12, 2007. Retrieved2007-10-25.^ Gaudin, Sharon, Two Men Convicted Of Spamming PornographyInformationWeek, June 26, 2007^ "Crist Announces First Case Under Florida Anti-Spam Law". Office of theFlorida Attorney General. Retrieved 2008-02-23.^ "Crist: Judgment Ends Duos Illegal Spam, Internet Operations". Office of theFlorida Attorney General. Retrieved 2008-02-23.^ "Woman gets prison for Nigerian scam".^ "Woman Gets Two Years for Aiding Nigerian Internet Check Scam (PC World)"[dead link]^ Businessman wins e-mail spam case - BBC News, 2005-12-27^ Gordon Dick v Transcom Internet Service Ltd.^ Article 13-Unsolicited communications^ website^ Kiwi spam network was worlds biggest^ Court Orders Australia-based Leader of International Spam Network to Pay$15.15 MillionSourcesSpecter, Michael (2007-08-06). "Damn Spam". The New Yorker. Retrieved2007-08-02.Further readingSjouwerman, Stu; Posluns, Jeffrey, "Inside the spam cartel: trade secrets fromthe dark side", Elsevier/Syngress; 1st edition, November 27, 2004. ISBN978-1-932266-86-3External links Wikimedia Commons has media related to: Electronic spamSpamtrackers SpamWiki: a peer-reviewed spam information and analysisresource.Federal Trade Commission page advising people to forward spam e-mail to themSlamming Spamming Resource on SpamWhy am I getting all this spam? CDTCybertelecom:: Federal spam law and policyReaction to the DEC Spam of 1978 Overview and text of the first known internetemail spam.Malware City - The Spam Omelette BitDefender’s weekly report on spam trendsand techniques.
  34. 34. 1 December 2009: arrest of a major - This website provides you with disposable e-mail addresseswhich expire after 15 Minutes. You can read and reply to e-mails that are sent tothe temporary e-mail address within the given time frame.Spam Analysis of 2010 and estimated Spam for 2011 - Article about SpamAnalysis of 2010 and estimated Spam for 2011[hide]v · d · eSpammingProtocolsE-mail spamAddress munging · Bulk email software · Directory Harvest Attack · Joe job ·DNSBL · DNSWL · Spambot · Pink contractOtherAutodialer/Robocall · Flyposting · Junk fax · Messaging · Mobile phone ·Newsgroup · Telemarketing · VoIPAnti-spamDisposable e-mail address · E-mail authentication · SORBS · SpamCop ·Spamhaus · List poisoning · Bayesian spam filtering · Network AbuseClearinghouseSpamdexingKeyword stuffing · Google bomb · Scraper site · Link farm · Cloaking · Doorwaypage · URL redirection · Spam blogs · Sping · Forum spam · Blog spam · Socialnetworking spam · Referrer spam · Parasite hostingInternet fraudAdvance-fee fraud · Lottery scam · Make Money Fast · Phishing · Vishing AdwareFrom Wikipedia, the free encyclopediaFor the Lavasoft anti-virus program, see Ad-Aware.This article needs additional citations for verification.Please help improve this article by adding reliable references. Unsourced material may bechallenged and removed. (August 2010)Adware, or advertising-supported software, is any software package which automatically plays,displays, or downloads advertisements to a computer. These advertisements can be in the formof a pop-up.[1] The object of the Adware is to generate revenue for its author. Adware, by itself, isharmless; however, some adware may come with integrated spyware such as keyloggers andother privacy-invasive software.[2][3][4]Contents [hide]1 Application1.1 Malware2 Prevention and detection
  35. 35. 3 Examples of adware4 Examples of advertising-delivery tools5 See also6 References7 Further reading8 External links[edit]ApplicationAdvertising functions are integrated into or bundled with the software, which is often designed tonote what Internet sites the user visits and to present advertising pertinent to the types of goodsor services featured there. Adware is usually seen by the developer as a way to recoverdevelopment costs, and in some cases it may allow the software to be provided to the user free ofcharge or at a reduced price. The income derived from presenting advertisements to the usermay allow or motivate the developer to continue to develop, maintain and upgrade the softwareproduct. Conversely, the advertisements may be seen by the user as interruptions orannoyances, or as distractions from the task at hand.Some adware is also shareware, and so the word may be used as term of distinction todifferentiate between types of shareware software. What differentiates adware from othershareware is that it is primarily advertising-supported. Users may also be given the option to payfor a "registered" or "licensed" copy to do away with the advertisements. The Eudora e-mail clientis an example of an adware "mode" in a program. After a trial period during which all programfeatures are available, the user is offered a choice: free of charge with limited functionality, amode with full functionality which displays advertisements for Eudora, or a paid mode thatenables all features and turns off the ads.[edit]MalwareSome adware can also be classified as spyware, a type of malware (malicious software) whichsteals information. For example BonziBUDDY, an application marketed as an "Intelligent softwareagent", corrupted many of the users system files, forcing the display of many obsceneadvertisements (composed mostly of infected Flash coding); these and the main applicationlogged browsing details and sent them to various third parties.[edit]Prevention and detectionPrograms have been developed to detect, quarantine, and remove spyware, including Ad-Aware,Malwarebytes Anti-Malware, Spyware Doctor and Spybot - Search & Destroy. In addition, almostall commercial antivirus software currently detect adware and spyware, or offer a separatespyware detection package.[5]The reluctance to add adware and spyware detection to commercial antivirus products was fueledby a fear of lawsuits.[citation needed] Kaspersky, for example, was sued by Zango for blockingthe installation of their products. Zango software and components are almost universally detectedas adware nowadays.[citation needed][edit]Examples of adware180SearchAssistantBonzi BuddyClipGenieComet CursorCydoorDollarRevenueErrorSafeGatorSecurity ToolVirusProtectPro[edit]Examples of advertising-delivery ToolbarFlashGet
  36. 36. Mirar ToolbarMyWay SearchbarTribal FusionViewpoint Media PlayerWhenU SaveNowZango productsZwinky[edit]See alsoComputer insecurityGreynetHosts fileTyphoid adware[edit]References^ Aaron Schwabach (2005). Internet and the Law: Technology, Society, and Compromises. ABC-CLIO. pp. 10. ISBN 978-1-85109-731-9.^ Tulloch, Mitch (2003). Koch, Jeff; Haynes, Sandra. eds. Microsoft Encyclopedia of Security.Redmond, Washington: Microsoft Press. p. 16. ISBN 0-7356-1877-1. "Any software that installsitself on your system without your knowledge and displays advertisements when the userbrowses the Internet."^ "Adware". Adware Protection Information. McAfee, Inc. Retrieved 2010-08-18.^ "adware". Dictionary.coms 21st Century Lexicon., LLC. Retrieved 18 August2010. "a software application in which advertisements are displayed while the program is running,esp. in pop-up windows or banners, and which often is installed without the users knowledge orconsent; also called advertising-supported software"^ Honeycutt, Jerry (20 April 2004). "How to protect your computer from Spyware and Adware" Microsoft corporation. "Things are changing for the better, though. Most popularantivirus products now include adware and spyware scanning. For example, the latest versions ofMcAfee VirusScan, Norton AntiVirus 2004, and Trend Micro PC-Cillin 2004 now scan for someadware and spyware."[edit]Further readingHoneycutt, Jerry (20 April 2004). "How to protect your computer from Spyware and Adware" Microsoft corporation. Retrieved 18 August 2010.Hardmeier, Sandi (16 December 2004). "Adware and Bad Things it Does". Internet Explorercommunity. Microsoft corporation. Retrieved 18 August 2010.[edit]External linksAdware and Spyware at the Open Directory ProjectAnti-Spyware Coalition[hide]v · d · eSoftware distributionMethodsAbandonware · Adware · Bundled · Beerware · Commercial · Donationware · Freelyredistributable software · Free software · Freeware · Nagware · Open source · Pre-installed ·Postcardware · Proprietary · Public domain · Scareware · SharewareRelated topicsProduct Activation · Shovelware · Software bloat Malware