Rabu, 01 Agustus 2007
History and development
History and development Spyware : The first recorded use of the term spyware occurred on October 16, 1995 in a Usenet post that poked fun at Microsoft's business model.[1] Spyware at first denoted hardware meant for espionage purposes. However, in early 2000 the founder of Zone Labs, Gregor Freund, used the term in a press release for the ZoneAlarm Personal Firewall.[2] Since then, "spyware" has taken on its present sense. [2] According to a 2005 study by AOL and the National Cyber-Security Alliance, 61% of surveyed users' computers had some form of spyware. 92% of surveyed users with spyware reported that they did not know of its presence, and 91% reported that they had not given permission for the installation of the spyware.[3] As of 2006, spyware has become one of the preeminent security threats to computer systems running Microsoft Windows operating systems. In an estimate based on customer-sent scan logs, Webroot Software, makers of Spy Sweeper, said that 9 out of 10 computers connected to the Internet are infected.[4] Computers where Internet Explorer (IE) is the primary browser are particularly vulnerable to such attacks not only because IE is the most widely-used,[5] but because its tight integration with Windows allows spyware access to crucial parts of the operating system.[6][5] Internet Explorer also enables, by default, the silent (read surreptitious) installation and execution of ActiveX controls under the naive assumption that such powerful executables are benign. The fragile, poorly documented, and arguably undesirable registry offers spyware numerous additional hiding places from which to start automatically and, along with sharing behavior, helps
Spyware
All about Spayware: Spyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent.
While the term spyware suggests software that secretly monitors the user's behavior, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information, but can also interfere with user control of the computer in other ways, such as installing additional software, redirecting Web browser activity, or diverting advertising revenue to a third party.
In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security best practices for Microsoft Windows desktop computers. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user's computer.
Contents
[hide]
* 1 History and development
* 2 Comparison
o 2.1 Spyware, adware and tracking
o 2.2 Spyware, virus and worm
* 3 Routes of infection
* 4 Effects and behaviors
o 4.1 Advertisements
o 4.2 "Stealware" and affiliate fraud
o 4.3 Identity theft and fraud
o 4.4 Digital rights management
o 4.5 Spyware and cookies
o 4.6 Examples of spyware
* 5 Legal issues related to spyware
o 5.1 Criminal law
o 5.2 Civil law
o 5.3 Libel suits by spyware developers
* 6 Remedies and prevention
o 6.1 Anti-spyware programs
o 6.2 Fake anti-spyware programs
o 6.3 Security practices
* 7 Notable programs distributed with spyware
o 7.1 Notable programs formerly distributed with spyware
* 8 Notes
* 9 See also
* 10 External links
While the term spyware suggests software that secretly monitors the user's behavior, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information, but can also interfere with user control of the computer in other ways, such as installing additional software, redirecting Web browser activity, or diverting advertising revenue to a third party.
In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security best practices for Microsoft Windows desktop computers. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user's computer.
Contents
[hide]
* 1 History and development
* 2 Comparison
o 2.1 Spyware, adware and tracking
o 2.2 Spyware, virus and worm
* 3 Routes of infection
* 4 Effects and behaviors
o 4.1 Advertisements
o 4.2 "Stealware" and affiliate fraud
o 4.3 Identity theft and fraud
o 4.4 Digital rights management
o 4.5 Spyware and cookies
o 4.6 Examples of spyware
* 5 Legal issues related to spyware
o 5.1 Criminal law
o 5.2 Civil law
o 5.3 Libel suits by spyware developers
* 6 Remedies and prevention
o 6.1 Anti-spyware programs
o 6.2 Fake anti-spyware programs
o 6.3 Security practices
* 7 Notable programs distributed with spyware
o 7.1 Notable programs formerly distributed with spyware
* 8 Notes
* 9 See also
* 10 External links
Langganan:
Postingan (Atom)