Getting Rid Of Unwanted Guests

Page 1

Conry-Murray_Ch05.qxd 8/10/05 10:10 AM Page 67

Chapter 5 Getting Rid of Unwanted Guests, Part 2: Spyware, Adware, and Trojan Horses The preceding chapter discussed the rise of malware and examined two particular species of malware: viruses and worms. This chapter examines three other distinct kinds of security risks: spyware, adware, and Trojan horses. We’ll spend some time defining each of these risks, look at the legal and technological challenges of dealing with spyware and adware, and discuss how to protect yourself from these threats.

5.1 What Are Spyware, Adware, and Trojan Horses? In a narrow sense, spyware is a term for some tracking technologies (specifically, executable applications) deployed on your computer without adequate notice, consent, or control. Spyware can monitor your activities online and/or perform functions without your knowledge or consent. Depending on the program, spyware can track and report on every Web site you visit, generate pop-up advertising, change your home page and browser settings, or record every key you press. In its broader sense, spyware is also commonly used as the overall name for most types of potentially unwanted technologies detected by popular anti-spyware programs. These technologies are implemented in ways that impair your control over Reproduced from the book The Symantec Guide to Home Internet Security. Copyright 2005, Addison67 Wesley Professional. Reproduced by permission of Pearson Education, Inc., 800 East 96th Street, Indianapolis, IN 46240. Written permission from Pearson Education, Inc. is required for all other uses.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.