Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Adware and Spyware. Objectives u Define terms, scope, and motivation u Discuss impact (personal and business) u Review basic technical aspects u Provide.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
SPYWARE Presented by The State Security Office November 17, 2004.
Spyware and Adware Rick Carback 9/18/2005
What to do with Spyware and Adware Created by Justin Leung.
What is a Firewall Anyway?
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Rootkit Definition A rootkit is a collection of tools (programs) that enable administrator-level access to a computer or computer network. Typically, a.
COMPUTER APPLICATION READING SCHEME Presented by Diocesan Boys’ School L6A NG, K in- k wan F elix.
Spyware! THE BAD, THE WORSE, AND THE Ugly … ARE ALL INDICATIONS THAT SPYWARE MAY BE TAKING OVER YOUR COMPUTER!
1 Protecting your On-Line Privacy and PC. 2 Viruses, Worms, Trojan Horses, Spam, and Hoaxes Of the billions of messages per year, an increasing.
Basic Computer Maintenance Chatham University Information Technology Team.
How to Protect Your PC Grayware Adware, Malware, Spyware.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
 Meaning of spyware Spyware is a program that can be installed on computers, and which collects small pieces of information about users without their.
By: Donny Gray Katrina Winters Deondrick Pina Alex Napper.
Utility Programs and their Functions. Antivirus Software (Virus Checker) Keep the Computer software healthy and free of virus’ that can harm the function.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
Utility Programs  A type of system software that is used to solve a particular problem is called utility program. Many operating system provides different.
How to maintain your computer
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
What is a Firewall Anyway?. What is a firewall? A firewall is a network security device positioned between two different networks, usually between an.
Protecting Your Computer & Your Information
Hacker Zombie Computer Reflectors Target.
Malware Fighting Spyware, Viruses, and Malware Ch 4.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
What is a Computer Worm? A computer worm is a self- replicating program very similar to a virus. A virus attaches itself and becomes part of another executable.
SPYWARE Computer Applications L6D, LAM Siu Fai (18)
1 Spyware Ryan Myers Andrew Sullivan ECE 4112 – Spring 2005.
1 Protect Against Spywares – SpywareBlaster. 2 Content Introduction – - What is Spyware? - Danger - Sign of Trouble Solution Cleaning -- Spybot Protection.
Adware and Spyware By Mr. Arbogast.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Microsoft Office 2007 – Illustrated Introductory, Premium Video Edition Understanding Essential Computer Concepts.
Malware Adware Removal Best Free Malware Virus Protection Best Free Malware Adware Removal Service Best free Anti Spyware Removal Service Best free Trojan.
Network Security Lecture 28 Presented by: Dr. Munam Ali Shah.
S pyware refers to programs that use our Internet connection to send information from our personal computer to some other computer, normally without.
A Crawler-based Study of Spyware on the Web Authors: Alexander Moshchuk, Tanya Bragin, Steven D.Gribble, and Henry M. Levy University of Washington 13.
1 Spyware. ECE 4112-Internetwork Security2 Agenda Cookies Browser hijacking Bundled software Key loggers Spyware prevention and deletion.
Spybot-S&D Course: Fall 2004 Presented By: Ataul Bari Instructor: Dr. A. K. Aggarwal.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
How Spyware works?. Introduction Spyware is an umbrella name for many types of malicious codes Spy on ones behavior May watch web pages one visit and.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Spyware By Rachel Gaines. 55% of online users have been infected with Spyware.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Spyware: Prevention vs. Elimination, a comparison in efficiency.
Internet safety By Suman Nazir
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Spyware Also known as Adware. Introduction Identify Spyware, and the common problems they cause Provide customer with the information they need to correct.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
McAfee Antivirus Support By Techdotcomp nd Ave, Seattle, WA 98122, USA Phone: Based on Seattle, WA.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Managing Windows Security
Internet and security.
Spyware. By: Katheryn L. Gaston.
Presentation transcript:

Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A

Definition Spyware Internet jargon Internet jargon Programming Programming  put in someone ’ s computer secretly  gather information of user  take partial control of a computer For advertisers or other interested parties For advertisers or other interested parties

Relation with Adware Adware Adware  Software designed to serve advertising Like a spyware Like a spyware  tracking or reporting user information, without any notification

Relation with Cookies Cookie Cookie  store information about an Internet user Unknown Web site may store information about you  Spyware Unknown Web site may store information about you  Spyware Public concern Public concern

Extra Information When did spyware become popular? By a popular computer game (Elf Bowling) By a popular computer game (Elf Bowling)

How it enters your computer? 1) As a virus 2) Installing a new program  without the users knowing its existence 3) By drive-by dowloading  Spyware installed just by visiting a Web Site  Spyware installed just by visiting a Web Site

Effects on Computer Create unwanted Create unwanted  CPU activity  disk usage  network traffic Difficulty in connecting to the Internet Difficulty in connecting to the Internet

Examples of spyware CoolWebSearch CoolWebSearch  install through the weakness in Internet Explorer  Direct traffic to some advertisement site like coolwebsearch.com  pop-up ads  rewrite search engine result

Examples of spyware Internet Optimizer Internet Optimizer  Redirect Internet Explorer error pages to advertising  Cannot access password-protected sites

Examples of spyware Examples of Programs distrubuted with spyware: DivX DivX FlastGet (free version) FlastGet (free version) DAEMON Tools DAEMON Tools Bearshare Bearshare and more …

Legality Not illegal in any way Not illegal in any way User may prefer not to use those products User may prefer not to use those products Places like Washington passed laws, people other than the owner or operator Places like Washington passed laws, people other than the owner or operator  illegal to install software- altering Web-browser settings, disable computer-security software

Prevention and Remedies A number of techniques emerged to  remove spyware  block spyware  reduce the chance of getting spyware Simplest remedies: back up user data back up user data Reinstall the OS Reinstall the OS

Prevention and Remedies Anti-spyware programs Anti-spyware programs Work in two ways: Work in two ways: 1.Real-time protection 2.Detection and removal Examples: Lavasoft ’ s Ad-Aware SE, Spybot_Search & Destroy, spy sweeper and more Examples: Lavasoft ’ s Ad-Aware SE, Spybot_Search & Destroy, spy sweeper and more Screenshot of Lavasoft ’ s Ad-Aware SE

Prevention and Remedies Virtual Machine Virtual Machine  inhibit infection  provide separate environment  spyware enters the virtual environment  host computer unaffected

Situation in Hong Kong

Situation in Hong Kong Front-line staff Front-line staff  little knowledge on spyware A serious problem to solve A serious problem to solve Companies should focus on this Companies should focus on this

Remember Always use computers with awareness!! The End