Spyware
| |

 Malicious websites may attempt to install spyware on readers’ computers. In this screenshot a spamblog has triggered a pop-up that offers spyware in the guise of a security upgrade. In the field of computing, the term spyware refers to a … Read More

Working with web pages
| |

Choosing your favorite web pages To have direct access to web pages that are of particular importance, without having to navigate through the pages of their websites, it is advisable to use the option “Bookmarks” in your browser. Thus, when … Read More

HuntBar
| |

HuntBar, also called WinTools or Adware.Websearch, is a small family of spyware programs distributed by Traffic Syndicate. It is installed by ActiveX drive-by download at affiliate Web sites, or by advertisements displayed by other spyware programs — an example of … Read More

CoolWebSearch
| |

CoolWebSearch (also known as CWS) first appeared in May 2003 and is well known as a malicious keylogging[1] program which installs itself on Windows based computers. Effects CoolWebSearch has numerous effects when it is successfully installed on a users computer. … Read More

C2.LOP
| |

LOP, or Live Online Portal, is an adware component that is installed on computers. Lop.com is a web site owned by C2Media (NOTE: C2 Media is the name of a totally unrelated company from C2Media LTD which owns LOP.com). It … Read More

Spyware and cookies
| |

Anti-spyware programs often report Web advertisers’ HTTP cookies as spyware. Web sites (including advertisers) set cookies — small pieces of data rather than software—to track Web-browsing activity: for instance to maintain a “shopping cart” for an online store or to … Read More

Magic Lantern
| |

Magic Lantern is a keystroke logging program developed by the Federal Bureau of Investigation. Magic Lantern was first reported in a column by Bob Sullivan of MSNBC on 20 November 2001 [1], also by Ted Birdis of the Associated Press … Read More

Keystroke logging
| |

Keystroke logging (often called keylogging) is a diagnostic used in software development that captures the user’s keystrokes. It can be useful to determine sources of error in computer systems. Such systems are also highly useful for law enforcement and espionage—for … Read More

Spyware – virtual machines and security practices
| |

Using a virtual machine (such as a pre-built Browser Appliance for VMWare Player) can inhibit infection by spyware, malware, and viruses. Virtual machines provide seperate environments, so if spyware enters the virtual environment, the host computer remains unaffected. One can … Read More

Anti-spyware programs
| |

Lavasoft’s Ad-Aware, one of a few reliable commercial anti-spyware programs, scans the hard drive of a clean Windows XP system. Many programmers and some commercial firms have released products designed to remove or block spyware. Steve Gibson’s OptOut, mentioned above, … Read More

User consent and legality of spyware
| |

Gaining unauthorized access to a computer is illegal, under computer crime laws such as the United States Computer Fraud and Abuse Act. Since the owners of computers infected with spyware generally claim that they never authorized the installation, a prima … Read More

Typical examples of spyware
| |

A few examples of common spyware programs may serve to illustrate the diversity of behaviors found in these attacks. Caveat: As with computer viruses, researchers give names to spyware programs which frequently do not relate to any names that the … Read More

1 2