SlideShare a Scribd company logo
1 of 22
Download to read offline
SPYWARE
   Presented By : Subhadip Bhadra
    Roll: 1070097

                                    1
Table of Contents
–   Introduction
–   History and Development
–   What is Spyware?
–   What is Adware?
–   How does Spyware and Adware work?
–   How to detect if your computer has Spyware/Adware
–   What programs are there to help get rid of them?
–   Rating of the Programs
–   Recommendations
                                                        2
Introduction
Welcome to the What to do with Spyware and Adware Powerpoint
  presentation!

This presentation will talk about:

   What is Spyware and Adware
   How can you detect symptoms of these programs on your computer
   Rating of selected Spyware and Adware killing programs
   Recommendations by the technicians.




                                                                    3
History and development
 The first recorded use of the term spyware occurred on October 16,1995 in a
Usenet post that poked fun at Microsoft’s business model. However, in early
2000 the founder of Zone Labs, Gregor Freund, used the term in a press
release for the Zone Alarm Personal Firewall. Since then, "spyware" has taken
on its present sense. According to a 2005 study by AOL and the National
Cyber-Security Alliance, 61 percent of surveyed users' computers had some
form of spyware. 92 percent of surveyed users with spyware reported that
they did not know of its presence, and 91 percent reported that they had not
given permission for the installation of the spyware.] As , spyware has become
one of the preeminent security threats to computer systems running Microsoft
Windows operating systems


                                                                             4
What is Spyware and Adware?
    They are independent
    programs that can be
    automatically installed
    when you surf
    throughout the internet
    or when you install free
    software.


                               5
What is Spyware?
Advertising companies uses
spyware to “mine data” to
further help them advertise
better.
Uses your Internet connection
and reports statistical data
about you and your surfing
habits a 3rd party
Violating your privacy.
And is a completely LEGAL
program!
                                6
What is Adware?
      Adware are created by
      advertising companies
      Comes in the form of popups,
      unexplained advertising
      programs on your computer
      desktop like “Casino Night”.
      Advertising companies hope
      to generate money from
      customers who receive the
      popups or unexplained
      programs on their computers.
      Also a LEGAL program!

                                     7
How was Spyware/Adware work?

            Spyware and Adware
            programs have a
            tendency to hide as
            cookie or temporary
            internet files
            Adware startup has the
            tendency to hide itself
            in the register keys as
            normal program.
                                  8
How to detect you computer has spyware or
                      adware…
Continuous popups
Persistent change in
your homepage.
Slower computer
processing, takes
the computer longer
to process or
startup.
                                          9
Extreme symptoms of spyware or adware…

Internet browser
does not start up.
Parts of your
computer you
cannot access
without freezing.
Major core data is
lost or changed.
                                     10
Routes Of Infection

Spyware gets on a system through exploitation of
software vulnerabilities
.Spyware deceives user ,either by piggybacking on a
piece of desirable software such as Kazaa or Limewire
tricking them into installing it.
Some anti-spyware program masquerade as security
software while being spyware themselves .Some
attackers used the Spybot worm to install spyware that
put pornographic pop-ups on the infected system's
screen                                                 11
What programs are there to help get rid of those
                            programs?

Out of many programs out in the internet that were created to
  detecting spyware/adware, four programs were chosen for
  this presentation.. They are:

  Spybot Search and Destroy
  Ad-aware 6.0
  Symantec AntiVirus
  Spysweeper


                                                            12
Spybot Search and Destroy
Type: Spyware Killer

Advantages:
 – Has a Recovery feature that allows
   you to restore any files you may be
   deleted infected with spyware
 – Has an Immunity feature that protects
   you from already known spywares
Disadvantages:
 – Infrequent updates cause spywares to
   slip past scans and immunity
Comments:
 – Good program, but because of slow
   updates of spyware definitions, it
   renders the program not as useful       13
Spy Sweeper
Type: Spyware/ Adware (Free
Version)

Advantages:
 – Has a immunity shield that
   blocks known spywares.
Disadvantages:
 – Takes a while to scan.
 – Unless you pay for the Spy-
   Sweeper, it does not come with
   definition updates.
Comments:
 – Effective program, only
   backdraw is the payment you
   need to make yearly to keep the      14
   program updated.
Norton Symantec AntiVirus
Type: Virus/ Spyware/ Adware
Advantages:
     • Can detect viruses,
       hacking programs,
       spyware programs, adware
       programs, joke programs
       etc.
     • Comes with a firewall.
Disadvantages:
     • Detects very few
       adware/spyware programs
     • Very confusing to use.
Comments:
     • Norton Symantec still has
       ways to go in detecting           15
       adware/spyware programs
Ad-aware 6.0
Type: Adware

Advantages:
     • Easy to use scanning.
     • Detailed logs of where
       the adware and spyware
       programs are hidden.
Disadvantages:
     • Ad-aware was built was
       adware, so its ability to
       catch spyware is
       restricted
Comments:
     • Effective Program. A
       bit on the costly side           16
       but its well worth it.
Recommendations
Preventing spyware and adware from getting onto your
computer is your first step!
       – Do not download unnecessary software from the internet, especially
         free ones because they most likely have adware or spyware inside
         them.
       – If a download screen appears, asking you to confirm your download,
         click no if you not trying to install anything.
       – Avoid clicking advertised popups especially ones that mention “free”
         stuff if possible.




                                                                                17
Recommendations
Technical Recommendations

      – Some adware/spyware files like to hide in the temporary internet folders.
      – Disable saving of temporary files by going to Program Files, Control
        Panel, Network and Internet Connections, Internet Options, Temporary
        Internet Files Settings, Check Never under “Check for Newer Version of
        Stored Pages”.
      – Constantly delete old temporary files and cookies by going to Program
        Files, Control Panel, Network and Internet Connections, Internet
        Options, Delete Cookies and Delete Temporary Files.
      – Remember though, adware and spyware can be tricky, no matter how
        cautious you are, there are bound to be adware or spyware programs that
        install into your computer.
           » Always constantly scan your computer for adware and spyware and
              keep your Adware/Spyware killer programs fully updated at all
              times.
                                                                               18
Recommendations
Recommended Spyware/ Adware Killers without any restraints
 – The “Tri-Killer” combination:
      • Ad-aware 6.0 Professional Edition: Primary scanner
      • Spy-sweeper paid version: Primary scanner and use their immune guards.
      • Spybot Free Edition: Scan for any spyware Spy-Sweeper may have missed.
Recommended Spyware/ Adware Killers with a price restraints
      • Ad-aware 6.0 Free Edition: Primary Scanner
      • Spy-Sweeper paid version: Primary Scanner
      • Spybot Free Edition: Scan for any spyware Spy-Sweeper may have missed
Recommended Spyware/ Adware Killers with a time restraints
     (not recommended)
      • Ad-aware 6.0 Free Edition: Primary Scanner: Fast Scan Mode
      • Spybot Free Edition:
      • Suggestion: Spyware/ Adware killers are suppose to take time to scan, if you have time
        restraints, turn on the scanners, leave them running and go do something.

                                                                                                 19
Thank you for watching!

Any questions please ask!



                            20
References

For those interesting more in this topic, here are some links:
 http://www.symantecstore.com/dr/sat1/ec_Main.Entry?
 SP=10007&SID=27674&CID=0&DSP=0&CUR=840&PGRP=
 0&CACHE_ID=39910
 http://www.lavasoftusa.com/software/adaware/
 http://www.webroot.com/wb/products/spysweeper/index.php
 http://www.safer-networking.org/en/index.html




                                                                 21
Future Add-Ons

A detailed graph of the amounts of
spyware/adware that was found during research.
Additional software should be tested.
Discover is there a software that can detect and
destroy both adware and spyware effectively



                                               22

More Related Content

What's hot

What's hot (20)

Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adware
 
Spyware And Anti Virus Software Presentation
Spyware And Anti Virus Software PresentationSpyware And Anti Virus Software Presentation
Spyware And Anti Virus Software Presentation
 
Spyware
SpywareSpyware
Spyware
 
Spyware
SpywareSpyware
Spyware
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Spyware by Sahibe Alam
Spyware by Sahibe AlamSpyware by Sahibe Alam
Spyware by Sahibe Alam
 
Spyware and key loggers
Spyware and key loggersSpyware and key loggers
Spyware and key loggers
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
spyware
spyware spyware
spyware
 
spyware
spywarespyware
spyware
 
spyware
spywarespyware
spyware
 
Spyware
SpywareSpyware
Spyware
 
Spyware
SpywareSpyware
Spyware
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Spyware report
Spyware reportSpyware report
Spyware report
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
 
IT viruses
 IT viruses IT viruses
IT viruses
 

Viewers also liked

ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1wargames12
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Wie SEO und Social Media besser zusammenarbeiten können
Wie SEO und Social Media besser zusammenarbeiten können Wie SEO und Social Media besser zusammenarbeiten können
Wie SEO und Social Media besser zusammenarbeiten können Projecter GmbH
 
Different Types Of Computer Viruses
Different Types Of Computer VirusesDifferent Types Of Computer Viruses
Different Types Of Computer Virusesmartingarcia300
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virusYouQue ™
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS sohail awan
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesMario Reascos
 

Viewers also liked (20)

ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Wie SEO und Social Media besser zusammenarbeiten können
Wie SEO und Social Media besser zusammenarbeiten können Wie SEO und Social Media besser zusammenarbeiten können
Wie SEO und Social Media besser zusammenarbeiten können
 
Duan
DuanDuan
Duan
 
spyware
spywarespyware
spyware
 
All about viruses
All about virusesAll about viruses
All about viruses
 
Different Types Of Computer Viruses
Different Types Of Computer VirusesDifferent Types Of Computer Viruses
Different Types Of Computer Viruses
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Malware
MalwareMalware
Malware
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Spyware
SpywareSpyware
Spyware
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Blue Tooth Technoloty
Blue Tooth TechnolotyBlue Tooth Technoloty
Blue Tooth Technoloty
 
5 PEN PC TECHNOLOGY
5 PEN PC TECHNOLOGY5 PEN PC TECHNOLOGY
5 PEN PC TECHNOLOGY
 
W@P
W@PW@P
W@P
 

Similar to Spyware

Anti-virus software and spyware
Anti-virus software and spywareAnti-virus software and spyware
Anti-virus software and spywaredragaunus14
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
Adware and Browser Hijacker - Symptoms and Prevention
Adware and Browser Hijacker - Symptoms and PreventionAdware and Browser Hijacker - Symptoms and Prevention
Adware and Browser Hijacker - Symptoms and PreventionCarol Witson
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareTeodoro Cipresso
 
Malware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adwareMalware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adwareCyphort
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptxTayyabaAbbas4
 
7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been HackedCyware
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirusShabnam Bashir
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesSejahtera Affif
 
Evading Antivirus software for fun and profit
Evading Antivirus software for fun and profitEvading Antivirus software for fun and profit
Evading Antivirus software for fun and profitMohammed Adam
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentationDavid Lombrozo
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxsachingwalani24
 

Similar to Spyware (20)

Spywareguide1
Spywareguide1Spywareguide1
Spywareguide1
 
Spywareguide1
Spywareguide1Spywareguide1
Spywareguide1
 
Spywareguide1
Spywareguide1Spywareguide1
Spywareguide1
 
Anti-virus software and spyware
Anti-virus software and spywareAnti-virus software and spyware
Anti-virus software and spyware
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Adware and Browser Hijacker - Symptoms and Prevention
Adware and Browser Hijacker - Symptoms and PreventionAdware and Browser Hijacker - Symptoms and Prevention
Adware and Browser Hijacker - Symptoms and Prevention
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
 
Malware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adwareMalware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adware
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
 
7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked
 
Adware
AdwareAdware
Adware
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Spyware
SpywareSpyware
Spyware
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Evading Antivirus software for fun and profit
Evading Antivirus software for fun and profitEvading Antivirus software for fun and profit
Evading Antivirus software for fun and profit
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentation
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 

Spyware

  • 1. SPYWARE Presented By : Subhadip Bhadra Roll: 1070097 1
  • 2. Table of Contents – Introduction – History and Development – What is Spyware? – What is Adware? – How does Spyware and Adware work? – How to detect if your computer has Spyware/Adware – What programs are there to help get rid of them? – Rating of the Programs – Recommendations 2
  • 3. Introduction Welcome to the What to do with Spyware and Adware Powerpoint presentation! This presentation will talk about: What is Spyware and Adware How can you detect symptoms of these programs on your computer Rating of selected Spyware and Adware killing programs Recommendations by the technicians. 3
  • 4. History and development The first recorded use of the term spyware occurred on October 16,1995 in a Usenet post that poked fun at Microsoft’s business model. However, in early 2000 the founder of Zone Labs, Gregor Freund, used the term in a press release for the Zone Alarm Personal Firewall. Since then, "spyware" has taken on its present sense. According to a 2005 study by AOL and the National Cyber-Security Alliance, 61 percent of surveyed users' computers had some form of spyware. 92 percent of surveyed users with spyware reported that they did not know of its presence, and 91 percent reported that they had not given permission for the installation of the spyware.] As , spyware has become one of the preeminent security threats to computer systems running Microsoft Windows operating systems 4
  • 5. What is Spyware and Adware? They are independent programs that can be automatically installed when you surf throughout the internet or when you install free software. 5
  • 6. What is Spyware? Advertising companies uses spyware to “mine data” to further help them advertise better. Uses your Internet connection and reports statistical data about you and your surfing habits a 3rd party Violating your privacy. And is a completely LEGAL program! 6
  • 7. What is Adware? Adware are created by advertising companies Comes in the form of popups, unexplained advertising programs on your computer desktop like “Casino Night”. Advertising companies hope to generate money from customers who receive the popups or unexplained programs on their computers. Also a LEGAL program! 7
  • 8. How was Spyware/Adware work? Spyware and Adware programs have a tendency to hide as cookie or temporary internet files Adware startup has the tendency to hide itself in the register keys as normal program. 8
  • 9. How to detect you computer has spyware or adware… Continuous popups Persistent change in your homepage. Slower computer processing, takes the computer longer to process or startup. 9
  • 10. Extreme symptoms of spyware or adware… Internet browser does not start up. Parts of your computer you cannot access without freezing. Major core data is lost or changed. 10
  • 11. Routes Of Infection Spyware gets on a system through exploitation of software vulnerabilities .Spyware deceives user ,either by piggybacking on a piece of desirable software such as Kazaa or Limewire tricking them into installing it. Some anti-spyware program masquerade as security software while being spyware themselves .Some attackers used the Spybot worm to install spyware that put pornographic pop-ups on the infected system's screen 11
  • 12. What programs are there to help get rid of those programs? Out of many programs out in the internet that were created to detecting spyware/adware, four programs were chosen for this presentation.. They are: Spybot Search and Destroy Ad-aware 6.0 Symantec AntiVirus Spysweeper 12
  • 13. Spybot Search and Destroy Type: Spyware Killer Advantages: – Has a Recovery feature that allows you to restore any files you may be deleted infected with spyware – Has an Immunity feature that protects you from already known spywares Disadvantages: – Infrequent updates cause spywares to slip past scans and immunity Comments: – Good program, but because of slow updates of spyware definitions, it renders the program not as useful 13
  • 14. Spy Sweeper Type: Spyware/ Adware (Free Version) Advantages: – Has a immunity shield that blocks known spywares. Disadvantages: – Takes a while to scan. – Unless you pay for the Spy- Sweeper, it does not come with definition updates. Comments: – Effective program, only backdraw is the payment you need to make yearly to keep the 14 program updated.
  • 15. Norton Symantec AntiVirus Type: Virus/ Spyware/ Adware Advantages: • Can detect viruses, hacking programs, spyware programs, adware programs, joke programs etc. • Comes with a firewall. Disadvantages: • Detects very few adware/spyware programs • Very confusing to use. Comments: • Norton Symantec still has ways to go in detecting 15 adware/spyware programs
  • 16. Ad-aware 6.0 Type: Adware Advantages: • Easy to use scanning. • Detailed logs of where the adware and spyware programs are hidden. Disadvantages: • Ad-aware was built was adware, so its ability to catch spyware is restricted Comments: • Effective Program. A bit on the costly side 16 but its well worth it.
  • 17. Recommendations Preventing spyware and adware from getting onto your computer is your first step! – Do not download unnecessary software from the internet, especially free ones because they most likely have adware or spyware inside them. – If a download screen appears, asking you to confirm your download, click no if you not trying to install anything. – Avoid clicking advertised popups especially ones that mention “free” stuff if possible. 17
  • 18. Recommendations Technical Recommendations – Some adware/spyware files like to hide in the temporary internet folders. – Disable saving of temporary files by going to Program Files, Control Panel, Network and Internet Connections, Internet Options, Temporary Internet Files Settings, Check Never under “Check for Newer Version of Stored Pages”. – Constantly delete old temporary files and cookies by going to Program Files, Control Panel, Network and Internet Connections, Internet Options, Delete Cookies and Delete Temporary Files. – Remember though, adware and spyware can be tricky, no matter how cautious you are, there are bound to be adware or spyware programs that install into your computer. » Always constantly scan your computer for adware and spyware and keep your Adware/Spyware killer programs fully updated at all times. 18
  • 19. Recommendations Recommended Spyware/ Adware Killers without any restraints – The “Tri-Killer” combination: • Ad-aware 6.0 Professional Edition: Primary scanner • Spy-sweeper paid version: Primary scanner and use their immune guards. • Spybot Free Edition: Scan for any spyware Spy-Sweeper may have missed. Recommended Spyware/ Adware Killers with a price restraints • Ad-aware 6.0 Free Edition: Primary Scanner • Spy-Sweeper paid version: Primary Scanner • Spybot Free Edition: Scan for any spyware Spy-Sweeper may have missed Recommended Spyware/ Adware Killers with a time restraints (not recommended) • Ad-aware 6.0 Free Edition: Primary Scanner: Fast Scan Mode • Spybot Free Edition: • Suggestion: Spyware/ Adware killers are suppose to take time to scan, if you have time restraints, turn on the scanners, leave them running and go do something. 19
  • 20. Thank you for watching! Any questions please ask! 20
  • 21. References For those interesting more in this topic, here are some links: http://www.symantecstore.com/dr/sat1/ec_Main.Entry? SP=10007&SID=27674&CID=0&DSP=0&CUR=840&PGRP= 0&CACHE_ID=39910 http://www.lavasoftusa.com/software/adaware/ http://www.webroot.com/wb/products/spysweeper/index.php http://www.safer-networking.org/en/index.html 21
  • 22. Future Add-Ons A detailed graph of the amounts of spyware/adware that was found during research. Additional software should be tested. Discover is there a software that can detect and destroy both adware and spyware effectively 22