spyware

4,668 views

Published on

Published in: Technology
0 Comments
4 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
4,668
On SlideShare
0
From Embeds
0
Number of Embeds
9
Actions
Shares
0
Downloads
463
Comments
0
Likes
4
Embeds 0
No embeds

No notes for slide

spyware

  1. 1. <ul><li>PRESENTED BY: </li></ul><ul><li>M.MEENU </li></ul><ul><li>(08Q61A0535) </li></ul>
  2. 2. <ul><li>INTRODUCTION </li></ul><ul><li>HISTORY </li></ul><ul><li>WORKING PRINCIPLE </li></ul><ul><li>ADVANTAGES & DISADVANTAGES </li></ul><ul><li>CONCLUSION </li></ul><ul><li>REFERENCES </li></ul>
  3. 3. <ul><li>Spyware is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet (where it is sometimes called a spybot or tracking software ), spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties. Spyware can get in a computer as a software virus or as the result of installing a new program. </li></ul>
  4. 6. <ul><li>Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that the majority of shareware and freeware applications do not come with spyware. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers. </li></ul>
  5. 8. <ul><li>Aside from the questions of ethics and privacy, spyware steals from the user by using the computer's memory resources and also by eating bandwidth as it sends information back to the spyware's home base via the user's Internet connection. Because spyware is using memory and system resources, the applications running in the background can lead to system crashes or general system instability </li></ul>
  6. 10. <ul><li>Spyware is similar to a Trojan horse in that users unwittingly install the product when they install something else. </li></ul><ul><li>A common way to become a victim of spyware is to download certain peer-to-peer file swapping products that are available today </li></ul>
  7. 12. <ul><li>Aside from the questions of ethics and privacy, spyware steals from the user by using the computer's memory resources and also by eating bandwidth as it sends information back to the spyware's home base via the user's Internet connection. </li></ul><ul><li>Because spyware is using memory and system resources, the applications running in the background can lead to system crashes or general system instability </li></ul>
  8. 13. <ul><li>spyware exists as independent executable programs, they have the ability to monitor keystrokes, scan files on the hard drive, snoop other applications, such as chat programs or word processors, install other spyware programs, read cookies, change the default home page on the Web browser, consistently relaying this information back to the spyware author who will either use it for advertising/marketing purposes or sell the information to another party. </li></ul>
  9. 14. <ul><li>Data collecting programs that are installed with the user's knowledge are not, properly speaking, spyware, if the user fully understands what data is being collected and with whom it is being shared. However, spyware is often installed without the user's consent, as a drive-by download, or as the result of clicking some option in a deceptive pop-up window. Software designed to serve advertising, known as adware, can usually be thought of as spyware as well because it almost invariably includes components for tracking and reporting user information. However, marketing firms object to having their products called &quot;spyware.&quot; </li></ul>
  10. 15. <ul><li>The Big Lie about Spyware and Adware </li></ul><ul><li>Inside Spyware: A Guide to Finding, Removing and Preventing Online Pests </li></ul><ul><li>Spy checker </li></ul><ul><li>Webopedia's &quot;Did You Know&quot; Section </li></ul><ul><li>Webopedia's &quot;Did You Know?&quot; Article </li></ul>

×