SlideShare a Scribd company logo
1 of 7
What is spyware?
With so many types of malicious software being
spread around the Internet, it is important to be
aware of what spyware is and what spyware
does. Spyware is a general term used to
describe software that performs certain
behaviors, generally without appropriately
obtaining your consent first, such as:
Advertising
Collecting personal information
Changing the configuration of your computer
Spyware is often associated with software that
displays advertisements (called adware) or
pes of spyware
Spyware is any software that obtains information from a PC
without the user’s knowledge. There are many different
types of spyware operating on the Internet but you can
generally group them into two categories: Domestic
Spyware and Commercial Spyware.
Domestic Spyware is software that is usually purchased
and installed by computer owners to monitor the Internet
behavior on their computer networks. Employers use this
software to monitor employee online activities; some family
members use domestic spyware to monitor other family
members (such as reviewing the content of children’s chat
room sessions).
A third party can also install domestic spyware without the
knowledge of the computer owner. Law enforcement
officials have used domestic spyware to monitor suspected
criminal activity and criminals have used domestic
Commercial Spyware (also known as adware) is software
that companies use to track your Internet browsing activities.
Companies that track your online habits often sell this
information to marketers who then hit you with targeted
advertising—ads that match your browsing interests and
would most likely appeal to you.
Advertisers are delighted when they acquire such valuable
marketing information so easily; in the past marketers had to
bribe you to learn your preferences through contests,
registration surveys and the like. Those methods of gaining
your personal information still exist, but in those cases you
have the power to read the fine print to learn the fate of
your data and so could choose to consent or refuse.
Gaining your preferences by stealth using software spies is
far easier and offers a much more complete picture for the
marketing industry; as a result, spyware is everywhere. For
more information on how and when spyware attaches itself
to your computer, read
hat does spyware do
Knowing what spyware does can be a very
difficult process because most spyware is
designed to be difficult to remove. Other kinds of
spyware make changes to your computer that
can be annoying and can cause your computer
slow down or crash.
These programs can change your web browser's
home page or search page, or add additional
components to your browser you don't need or
want. They also make it very difficult for you to
change your settings back to the way you had
them.
How to prevent spyware
Whenever you install something on your computer,
make sure you carefully read all disclosures,
including the license agreement and privacy
statement. Sometimes the inclusion of unwanted
software in a given software installation is
documented, but it might appear at the end of a
license agreement or privacy statement.
Consultativ
e:

http://www.microsoft.com/security/pc-security/spywarewhatis.aspx

http://anti-spyware-review.toptenreviews.com/types-ofspyware.html

More Related Content

What's hot

Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Akhil Sharma
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
Joel May
 
P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!
aimane
 

What's hot (20)

Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
 
Spyware
SpywareSpyware
Spyware
 
Spyware
SpywareSpyware
Spyware
 
Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adware
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked
 
Aiman
AimanAiman
Aiman
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!
 
Spyware by Sahibe Alam
Spyware by Sahibe AlamSpyware by Sahibe Alam
Spyware by Sahibe Alam
 
DEFINING A SPYWARE
DEFINING A SPYWAREDEFINING A SPYWARE
DEFINING A SPYWARE
 
How to remove webhancer
How to remove webhancerHow to remove webhancer
How to remove webhancer
 
Spyware
SpywareSpyware
Spyware
 
Spyware
SpywareSpyware
Spyware
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Spyware and key loggers
Spyware and key loggersSpyware and key loggers
Spyware and key loggers
 
spyware
spywarespyware
spyware
 
Spyware
SpywareSpyware
Spyware
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Spyware
SpywareSpyware
Spyware
 

Viewers also liked

Mk. paris presentation oct. 25, 2013 (mozhan khadem's architecture)
Mk. paris presentation oct. 25, 2013 (mozhan khadem's architecture)Mk. paris presentation oct. 25, 2013 (mozhan khadem's architecture)
Mk. paris presentation oct. 25, 2013 (mozhan khadem's architecture)
mozhankhadem
 
The two faces of benedict arnold
The two faces of benedict arnoldThe two faces of benedict arnold
The two faces of benedict arnold
tony_odom
 

Viewers also liked (20)

SEO Secrets The Ultimate Traffic Guide - Online Udemy Course
SEO Secrets The Ultimate Traffic Guide - Online Udemy CourseSEO Secrets The Ultimate Traffic Guide - Online Udemy Course
SEO Secrets The Ultimate Traffic Guide - Online Udemy Course
 
Los valores
Los valoresLos valores
Los valores
 
RDMRose 1.2 Research and researchers
RDMRose 1.2 Research and researchersRDMRose 1.2 Research and researchers
RDMRose 1.2 Research and researchers
 
Wordpress slides nl
Wordpress slides nlWordpress slides nl
Wordpress slides nl
 
Drama conventions
Drama conventionsDrama conventions
Drama conventions
 
LOS VALORES
LOS VALORESLOS VALORES
LOS VALORES
 
Mk. paris presentation oct. 25, 2013 (mozhan khadem's architecture)
Mk. paris presentation oct. 25, 2013 (mozhan khadem's architecture)Mk. paris presentation oct. 25, 2013 (mozhan khadem's architecture)
Mk. paris presentation oct. 25, 2013 (mozhan khadem's architecture)
 
LeadershipProfile_Annelies Homma_232
LeadershipProfile_Annelies Homma_232LeadershipProfile_Annelies Homma_232
LeadershipProfile_Annelies Homma_232
 
Motor telematics - loss ratio improvement
Motor telematics - loss ratio improvementMotor telematics - loss ratio improvement
Motor telematics - loss ratio improvement
 
Présentation Sommet iPad en éducation 1er mai 2015
Présentation Sommet iPad en éducation 1er mai 2015Présentation Sommet iPad en éducation 1er mai 2015
Présentation Sommet iPad en éducation 1er mai 2015
 
iins
iinsiins
iins
 
с Днем Великой Победы!
с Днем Великой Победы!с Днем Великой Победы!
с Днем Великой Победы!
 
RDMRose 1.4 The research data lifecycle
RDMRose 1.4 The research data lifecycleRDMRose 1.4 The research data lifecycle
RDMRose 1.4 The research data lifecycle
 
Décret n° 2015 194 du 19 février 2015
Décret n° 2015 194 du 19 février 2015Décret n° 2015 194 du 19 février 2015
Décret n° 2015 194 du 19 février 2015
 
ATUS - A Toolkit for Usable Security
ATUS - A Toolkit for Usable SecurityATUS - A Toolkit for Usable Security
ATUS - A Toolkit for Usable Security
 
La linea y el punto
La linea y el puntoLa linea y el punto
La linea y el punto
 
The two faces of benedict arnold
The two faces of benedict arnoldThe two faces of benedict arnold
The two faces of benedict arnold
 
Maratona aquática - Trabalho SESI
Maratona aquática - Trabalho SESIMaratona aquática - Trabalho SESI
Maratona aquática - Trabalho SESI
 
David Buckingham
David BuckinghamDavid Buckingham
David Buckingham
 
Los valores,amistad,amor,compartir,
Los valores,amistad,amor,compartir,Los valores,amistad,amor,compartir,
Los valores,amistad,amor,compartir,
 

Similar to Spyware.

Web design premium
Web design premiumWeb design premium
Web design premium
jeannined_1
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats
07Deeps
 

Similar to Spyware. (20)

Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
Spyware.pdf
Spyware.pdfSpyware.pdf
Spyware.pdf
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
 
Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptx
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
What is malware
What is malwareWhat is malware
What is malware
 
Web design premium
Web design premiumWeb design premium
Web design premium
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Spyware, spying software, computer spying
Spyware, spying software, computer spying Spyware, spying software, computer spying
Spyware, spying software, computer spying
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
IT viruses
 IT viruses IT viruses
IT viruses
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas Informática
 
CYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptxCYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptx
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Computer security
Computer securityComputer security
Computer security
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Spywares & Keyloggers
Spywares & KeyloggersSpywares & Keyloggers
Spywares & Keyloggers
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats
 

Recently uploaded

Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 

Recently uploaded (20)

Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 

Spyware.

  • 1.
  • 2. What is spyware? With so many types of malicious software being spread around the Internet, it is important to be aware of what spyware is and what spyware does. Spyware is a general term used to describe software that performs certain behaviors, generally without appropriately obtaining your consent first, such as: Advertising Collecting personal information Changing the configuration of your computer Spyware is often associated with software that displays advertisements (called adware) or
  • 3. pes of spyware Spyware is any software that obtains information from a PC without the user’s knowledge. There are many different types of spyware operating on the Internet but you can generally group them into two categories: Domestic Spyware and Commercial Spyware. Domestic Spyware is software that is usually purchased and installed by computer owners to monitor the Internet behavior on their computer networks. Employers use this software to monitor employee online activities; some family members use domestic spyware to monitor other family members (such as reviewing the content of children’s chat room sessions). A third party can also install domestic spyware without the knowledge of the computer owner. Law enforcement officials have used domestic spyware to monitor suspected criminal activity and criminals have used domestic
  • 4. Commercial Spyware (also known as adware) is software that companies use to track your Internet browsing activities. Companies that track your online habits often sell this information to marketers who then hit you with targeted advertising—ads that match your browsing interests and would most likely appeal to you. Advertisers are delighted when they acquire such valuable marketing information so easily; in the past marketers had to bribe you to learn your preferences through contests, registration surveys and the like. Those methods of gaining your personal information still exist, but in those cases you have the power to read the fine print to learn the fate of your data and so could choose to consent or refuse. Gaining your preferences by stealth using software spies is far easier and offers a much more complete picture for the marketing industry; as a result, spyware is everywhere. For more information on how and when spyware attaches itself to your computer, read
  • 5. hat does spyware do Knowing what spyware does can be a very difficult process because most spyware is designed to be difficult to remove. Other kinds of spyware make changes to your computer that can be annoying and can cause your computer slow down or crash. These programs can change your web browser's home page or search page, or add additional components to your browser you don't need or want. They also make it very difficult for you to change your settings back to the way you had them.
  • 6. How to prevent spyware Whenever you install something on your computer, make sure you carefully read all disclosures, including the license agreement and privacy statement. Sometimes the inclusion of unwanted software in a given software installation is documented, but it might appear at the end of a license agreement or privacy statement.