New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online.
image
Prime Choice
· Head Lines
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 18)
· Marcia's (QA2)
· Bill G's (CO4)
· Paul's (AR 5)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· Recommend Us
· RegChat
· Reviews
· Search (Topics)
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
Which Anti-Virus product do you use?

Computer Associates
Eset (NOD32)
F-Secure
Frisk (F-Prot)
Grisoft (AVG)
Kaspersky
Network Associates (McAfee)
Panda
Sophos
Symantec (NAV)
Trend Micro
Other



Results
Polls

Votes: 18319
Comments: 152
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image prvy: Malware: Ill Intentions: Adware and Spyware Applications image
Privacy
Ill Intentions: Adware and Spyware Applications
By Ronald Pacchiano

QQ. The other day at the office, one of my co-workers and I were discussing a recent virus problem I had encountered and ways to prevent it from happening again. He had suggested that installing Symantec's Norton Anti-Virus or McAfee VirusScan on my system would limit my chances of getting re-infected.

During our conversation one of our company's network technicians came by and said that as good as those packages are, they aren't going to be able to completely safeguard my system against all types of threats.

He suggested that I also look into software that guards against Adware and Spyware. Now I have heard of these types of programs before, but to be honest I don't really understand how they differ from other viruses, and I find it even more unlikely that an application like Norton or McAfee would be unable to detect and remove them. However, if this is true, how do I go about protecting my system from them, and do I still need to invest in Norton or McAfee for virus protection?


AA. Your technician friend is correct in telling you that neither Norton nor McAfee is completely capable of protecting you from Adware or Spyware programs. The primary reason for this is that these programs operate somewhat differently than your typical virus. By definition a virus is a piece of programming code normally disguised as something else that causes some undesirable effect on the target PC. They are often designed to automatically spread to other computer users via e-mail attachments, as downloads, or by sharing infected floppy diskettes.

In most cases, the sender of the virus you've received is often unaware of its existence. Some viruses go into effect as soon as their code is executed, while others lie dormant until circumstances cause their code to be executed. This could be triggered by the user or by something as simple as a date change. Some viruses are playful in intent and effect, while others can be quite harmful, erasing data or causing your hard drive to require reformatting.

Anti-virus software like Norton or McAfee is generally designed to identify certain classes of viruses. Most viruses usually come in the form of file infectors, system or boot-record infectors, or Macro viruses. A more detailed description of each of these virus classes can be found here. In recent years, these classes have expanded to also include Trojan horses and worms.

Adware and spyware programs, however, act somewhat differently. Even though they possess many of the same characteristics as viruses, they aren't necessarily viruses. This is one of the main reasons anti-virus programs don't typically address the problem very well. Before covering how to go about removing these applications from your system, let's first look at exactly what these programs are.

Adware can do a number of things from monitoring your online surfing and spending habits to generating those annoying popup ad windows as you surf. There are numerous ways for your PC to become infected with adware. In some cases, adware has been bundled with other software without the user's knowledge or slipped into the fine print of a End User License Agreement (EULA).

This is actually quite common with many of the peer-to-peer file swapping services (like KaZaA). Adware can also be picked up by simply visiting various websites. Another form of adware is referred to as ParasiteWare. ParasiteWare is the term for any adware that by default overwrites certain affiliate tracking links. These tracking links are used by webmasters to sell products and to help fund websites.

While in general adware isn't really dangerous, it can be quite obnoxious in that it performs drive-by downloads. Drive-by downloads are accomplished by providing the user with a misleading dialogue box that forces a stealth installation. Many times users have no idea they have installed the application at all, and it's quite typical for adware developers to make their applications very difficult to uninstall.

Unlike adware, spyware is potentially a more dangerous beast because of the type of information it can gain access to. Spyware covertly gathers confidential and private information, and monitors system activity without the user's knowledge. Spyware can record your keystrokes as you type them, obtaining passwords and credit card numbers, tracking where you surf, and logging chat sessions, and can even take random screenshots of your activity. Basically, whatever you do on the computer is completely viewable by the spy. Spyware is often sold as a spouse monitor, child monitor, surveillance tool, or simply as a tool to spy on users that gain unauthorized access to your PC.

You do not have to be connected to the Internet to be spied upon. The latest permutations of spyware include the use of surreptitious routines that mail out user activity via e-mail or post information to the web where the controlling spy can view it at his or her leisure. Many spyware vendors also use stealth routines or polymorphic (changing forms) techniques to avoid detection and removal by popular anti-spy software. In some cases, spyware vendors have gone so far as to counter-attack anti-spy packages by attempting to shut-down their use. In addition, they may use routines to re-install the spyware application after it has been detected.

One of the places you're most likely to find spyware is on your own office PC. In a work environment it is always best to assume that you are being monitored. Most employers have the right to do this, so get used to it. There are several ways employers can monitor employees. Some use activity logging software to see what programs are being accessed and for how long, while others will actually monitor internet traffic as it moves across an intranet. Many software programs that are designed for spying require physical access to the target machine, so be on the lookout for people trying to gain access to your machine.

Now that we know what adware and spyware software is, we can move on to identifying and removing it from your system. Next week we'll talk about what signs to look out for that might indicate your system has become infected by these applications. We'll also look at some utilities you can use to remove them from your computer.

sbc by Claire
Posted on Friday, 10 October 2003 @ 05:05:00 EDT by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· PHP HomePage
· Microsoft
· HotScripts
· W3 Consortium
· More about Privacy
· News by phoenix22


Most read story about Privacy:
Ad-aware 6 Release from Lavasoft

image
Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

Send to a Friend  Send to a Friend
image
"Login" | Login/Create an Account | 0 comments
Threshold
  
The comments are owned by the poster. We aren't responsible for their content.