Download presentation
Presentation is loading. Please wait.
1
Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A
2
Definition Spyware Internet jargon Internet jargon Programming Programming put in someone ’ s computer secretly gather information of user take partial control of a computer For advertisers or other interested parties For advertisers or other interested parties
3
Relation with Adware Adware Adware Software designed to serve advertising Like a spyware Like a spyware tracking or reporting user information, without any notification
4
Relation with Cookies Cookie Cookie store information about an Internet user Unknown Web site may store information about you Spyware Unknown Web site may store information about you Spyware Public concern Public concern
5
Extra Information When did spyware become popular? 1999 1999 By a popular computer game (Elf Bowling) By a popular computer game (Elf Bowling)
6
How it enters your computer? 1) As a virus 2) Installing a new program without the users knowing its existence 3) By drive-by dowloading Spyware installed just by visiting a Web Site Spyware installed just by visiting a Web Site
7
Effects on Computer Create unwanted Create unwanted CPU activity disk usage network traffic Difficulty in connecting to the Internet Difficulty in connecting to the Internet
8
Examples of spyware CoolWebSearch CoolWebSearch install through the weakness in Internet Explorer Direct traffic to some advertisement site like coolwebsearch.com pop-up ads rewrite search engine result
9
Examples of spyware Internet Optimizer Internet Optimizer Redirect Internet Explorer error pages to advertising Cannot access password-protected sites
10
Examples of spyware Examples of Programs distrubuted with spyware: DivX DivX FlastGet (free version) FlastGet (free version) DAEMON Tools DAEMON Tools Bearshare Bearshare and more …
11
Legality Not illegal in any way Not illegal in any way User may prefer not to use those products User may prefer not to use those products Places like Washington passed laws, people other than the owner or operator Places like Washington passed laws, people other than the owner or operator illegal to install software- altering Web-browser settings, disable computer-security software
12
Prevention and Remedies A number of techniques emerged to remove spyware block spyware reduce the chance of getting spyware Simplest remedies: back up user data back up user data Reinstall the OS Reinstall the OS
13
Prevention and Remedies Anti-spyware programs Anti-spyware programs Work in two ways: Work in two ways: 1.Real-time protection 2.Detection and removal Examples: Lavasoft ’ s Ad-Aware SE, Spybot_Search & Destroy, spy sweeper and more Examples: Lavasoft ’ s Ad-Aware SE, Spybot_Search & Destroy, spy sweeper and more Screenshot of Lavasoft ’ s Ad-Aware SE
14
Prevention and Remedies Virtual Machine Virtual Machine inhibit infection provide separate environment spyware enters the virtual environment host computer unaffected
15
Situation in Hong Kong
16
Situation in Hong Kong Front-line staff Front-line staff little knowledge on spyware A serious problem to solve A serious problem to solve Companies should focus on this Companies should focus on this
17
Remember Always use computers with awareness!! The End
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.