A spyware can be defined as any program which is entered into a system secretly and gathers information saved within it and transfers it to a third party without making it in the knowledge of the user. It enters into the system as a result of installing a new application.
1. DEFINING A SPYWARE
A spyware can be defined as any program which is
entered into a system secretly and gathers
information saved within it and transfers it to a third
party without making it in the knowledge of the user.
It enters into the system as a result of installing a
new application.
http://www.spywareremoversreview.net
2. HOW DOES A SPYWARE ENTERS
INTO A SYSTEM
Drive-
Drive-by download
Piggybacked software installations
Browser add-ons
add-
Masquerading as anti-spyware
anti-
http://www.spywareremoversreview.net
3. WHAT CAN SPYWARE DO
Hogs up RAM and
processing power.
Generates endless pop-up
pop-
screens.
It resets the home page settings of the web browser.
Redirects the web search process.
Modifies DLL’s.
http://www.spywareremoversreview.net
4. WHAT CAN SPYWARE DO
Can record every
action performed on
the system.
Modifies Internet
settings.
Changes firewall settings.
Stops the user from removing them from the registry.
Steals affiliated credits.
http://www.spywareremoversreview.net
5. TYPES OF SPYWARE
Adware
Back Doors
Keyloggers
Dialers
Modem hijacking
Page hijacking
Screen recorders
Chat loggers
Calling home
http://www.spywareremoversreview.net
6. TYPES OF SPYWARE
Adware:
Adware: Monitors browser habits and the words
that are typed in the search engine.
Back Doors: Offers entry of a hacker or spammer
Doors:
within the system.
Keyloggers:
Keyloggers: Keeps track of every keystroke of the
system.
http://www.spywareremoversreview.net
7. TYPES OF SPYWARE
Dialers:
Dialers: Mainly uses adult sites to install specific
programs on the system.
Modem Hijacking: Installs script which changes
Hijacking:
the dial-up number of the modem.
dial-
Page Hijacking: Installs malicious scripts through
Hijacking:
web browsers.
contd
http://www.spywareremoversreview.net
8. TYPES OF SPYWARE
Screen Recorders: Record screen captures at
Recorders:
timely intervals and saves them in a file.
Chat Loggers: It is a hidden program on the
Loggers:
system and records all the IM’s of the system.
Calling Home: Tends to send information to the
Home:
creator of the program.
http://www.spywareremoversreview.net
9. BASIC PRINCIPLES OF SPYWARE
Has the ability to read
anything on the system.
Can also be used legally
in order to monitor the
activities performed on the system.
Allowed by businesses for promotional
purposes.
contd
http://www.spywareremoversreview.net
10. BASIC PRINCIPLES OF SPYWARE
Extremely hard to avoid this program.
Prevails all over the
Internet.
In order to prevent,
avoid downloading
from the Internet.
http://www.spywareremoversreview.net
11. HOW TO REMOVE SPYWARE
Download anti-spyware tools.
anti-
Perform a manual analysis.
Get rid of Rootkits
http://www.spywareremoversreview.net
12. DOWNLOAD ANTI-SPYWARE
ANTI-
TOOLS
Download malicious Software Removal Tool.
Download Windows Defender
Download a free anti-virus application.
anti-
http://www.spywareremoversreview.net
13. PERFORM A MANUAL
ANALYSIS
Examine all
operations of the
operating system.
Detect for unusual behaving applications.
Do some research if the program is unknown
to you.
http://www.spywareremoversreview.net
14. GET RID OF ROOTKITS
Nastiest specimen of spyware.
Hides themselves from
anti-
anti-spyware tools.
Install anti-rootkit utility tool.
anti-
http://www.spywareremoversreview.net
15. FINAL WORD
To stay safe from spyware, avoid installing
applications from the web or make sure
you download them from a reliable source
which has the feature on anti-spyware
anti-
program!
http://www.spywareremoversreview.net