S pyware refers to programs that use our Internet connection to send information from our personal computer to some other computer, normally without.

Slides:



Advertisements
Similar presentations
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Advertisements

Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Thank you to IT Training at Indiana University Computer Malware.
What is Spyware? Where did it come from?.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
Spyware and Adware Rick Carback 9/18/2005
Spyware and other annoying Pop-ups. What are we going to learn? What is spyware What is the threat Where does it come from Why does spyware exist How.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Spyware & It’s Remedies CS 526 Research Project Spring 2008 Presented By - Ankur Chattopadhyay Erica Kirkbride University Of Colorado At Colorado Springs.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.
COMPUTER APPLICATION READING SCHEME Presented by Diocesan Boys’ School L6A NG, K in- k wan F elix.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
How to Protect Your PC Grayware Adware, Malware, Spyware.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Use computer and internet safely Dave Dai Computer security Malware Virus: a program that copies itself and infect a computer without permission.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
By: Donny Gray Katrina Winters Deondrick Pina Alex Napper.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
Spyware & Internet Security
Chapter Nine Maintaining a Computer Part III: Malware.
ANTIVIRUS AND ANTI-SPYWARE.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
Protecting Your Computer & Your Information
Malware Fighting Spyware, Viruses, and Malware Ch 4.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
What is a Computer Worm? A computer worm is a self- replicating program very similar to a virus. A virus attaches itself and becomes part of another executable.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 49 The Dangers of Spyware and Phishing.
Anti-Spyware Solutions for MIT IT Partners Conference, April 19, 2005 Jonathan Hunt Senior Manager Software Service, IS&T.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
PC Maintenance How to keep your computer healthy.
Spyware, Viruses and Malware What the fuss is all about.
Lecture 2 Title: Computer Software By: Mr Hashem Alaidaros MIS 101.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Spybot-S&D Course: Fall 2004 Presented By: Ataul Bari Instructor: Dr. A. K. Aggarwal.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
W elcome to our Presentation. Presentation Topic Virus.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Speeding Up Your PC Roger Libman. Typical Repair Orders.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
Computer Security Keeping you and your computer safe in the digital world.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
For more information on Rouge, visit:
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Spyware & Internet Security
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

S pyware refers to programs that use our Internet connection to send information from our personal computer to some other computer, normally without our knowledge or permission.

In General: Do not work as viruses Create unwanted: CPU activity Disk usage Network traffic Rarely "lives" alone

These first viruses weren't dangerous only meant as a bit of fun. People have always been looking for a way to use the internet to make money. In the 1990's people started advertising on the internet as a way to promote their businesses. Internet marketing was initially used to promote all sorts of things. Banner adverts and text links were common types of advertising campaigns. The first known use of the expression "spyware" occurred on October 17th, 1994 in a post that joked about Microsoft's business model.

October 17 th 1994: Usenet: Making fun at MS business model Early 2000: First reports of “spyware” - Aureate 2000: First anti-“spyware” software OptOut About 6 known spyware + about 5 possible spyware January 26th 2001: Press release: ZoneAlarm Personal Firewall

Saturday, 25 Jan 2003 — A New Worm is Loose The worm is known by the names "SQL Sapphire”. In 2005, spywares came in the form of Active-X controls, with ads, as a browser-hijacks. Since then, the computer-community has used the term in its current definition.

It will only be installed onto computers if someone runs the install program of an infected program. It is commonly bundled with illegal software and freeware.

Adware, Malware, Stealware Pop-up Identity theft Dialers Cookies DRM - Rootkit

Spyware can be downloaded from Web sites, messages, instant messages Spyware often comes from direct file-sharing connections like KAZAA, UTORRENT, RAPIDSHARE. Spyware often comes wrapped-in with shareware or other software, and with music CDs.

Spyware CommercialWeb BugsAd-wares Browser- Hijacks Trojans & Viruses domestic Keyloggers & password recorders & Screen Recorders Modem Hijacking PC Hi-jacking

More than spyware fingerprints, Ad-Aware More than 300 Millions Infected.

A Threat, 300 million and over 70% computers are infected with The usual solution people find is to format their drives after being attacked with these bugs Google, msn and various search engines now needs to confirm and test the actual user process differing it from the automated queries The spywares footprints are increasing by everyday life yet antispyware soft wares are updating their trackers daily too

CoolWebSearch Gator 180search Assistant InternetOptimizer Hot as Hell Advanced Keylogger TIBs dialer

Pop-up, rewrite search, change host file Recent variants of CoolWebSearch install using malicious HTML applications or security flaws Such as exploits in the HTML Help format and Microsoft Java virtual machines.

Gator is an adware program that may display banner advertisements based on user Web surfing habits.adware Gator is usually bundled with numerous free software programs, including the popular file-sharing program Kazaa. Kazaa

Redirect IE error pages to ads

A few typical examples of spyware

Designed or intended to combat or eliminate spyware on a computer system

Change browser (e.g. Mozilla, opera, chrome) Do not download executables Only download from vendors or well-checked sites Watch out for cookies Avoid HTML s – Use plaintext Read EULA Avoid drive-by download – Change security level

Superantispyware Spy Sweeper Ad-Aware Windows Defender Spyware Eliminator Counter Spy **Spy Deleter – Installs spyware

A spyware remover actively scans your computer for spyware by analyzing the codes comparing these to its database of known spyware definitions The key to effective spyware detection is the cleaner's definitions database that's provided by the software publisher. The larger the database, the more spyware the cleaner can identify and remove.

Trackers Adware cookies Phishing spywares ANTISPYWARES

The best scan that we can have on our PC is turning the Safe-Mode on and have a scan Safe-mode enables a user to work with the least enabled devices and utilities Even most of the drivers are disabled in a safe-mode A low resolution profile can be seen once safe-mode is turned on

SAFE-MODE

Now what you do is that you locally run your antispyware program from the start menu, Running the program, you can have thorough scan of the system including the drivers and the items that occupy

Google is a search engine, we all know, but this can benefit you in some more ways. Let us see how google would help you removing a spyware manually

Task-manager, ms utility to manage the processes Helps to terminate the spywares and remove them manually. Terminate a program, not working. Terminate programs, not in use

A Combo of the keys CTRL, ALT & DEL at any time in windows runtime mode opens a box termed as task- manager Once opened, go upon processes and see which process to terminate This terminology of terminating a process helps you delete spywares from the root directory The root directory for most spywares is C:/Windows/System32

A known spyware is generally terminated and then deleted from the registry and from the root directory after terminating it from the processes The spywares can manually be terminated only if you’re aware of the system’s processes. The processes include drivers, running applications and spywares as well. Spywares and spywares usually show up under the user section

Another ms-utility that enables ms. Windows users to edit the start-up processes configurations With this utility you can stop spywares to run at the start-up.

Msconfig

Lets you play with the registry of softwares and hardwares Now see the Tutorial.

References