Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.

Similar presentations


Presentation on theme: "Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A."— Presentation transcript:

1 Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A

2 Definition Spyware Internet jargon Internet jargon Programming Programming  put in someone ’ s computer secretly  gather information of user  take partial control of a computer For advertisers or other interested parties For advertisers or other interested parties

3 Relation with Adware Adware Adware  Software designed to serve advertising Like a spyware Like a spyware  tracking or reporting user information, without any notification

4 Relation with Cookies Cookie Cookie  store information about an Internet user Unknown Web site may store information about you  Spyware Unknown Web site may store information about you  Spyware Public concern Public concern

5 Extra Information When did spyware become popular? 1999 1999 By a popular computer game (Elf Bowling) By a popular computer game (Elf Bowling)

6 How it enters your computer? 1) As a virus 2) Installing a new program  without the users knowing its existence 3) By drive-by dowloading  Spyware installed just by visiting a Web Site  Spyware installed just by visiting a Web Site

7 Effects on Computer Create unwanted Create unwanted  CPU activity  disk usage  network traffic Difficulty in connecting to the Internet Difficulty in connecting to the Internet

8 Examples of spyware CoolWebSearch CoolWebSearch  install through the weakness in Internet Explorer  Direct traffic to some advertisement site like coolwebsearch.com  pop-up ads  rewrite search engine result

9 Examples of spyware Internet Optimizer Internet Optimizer  Redirect Internet Explorer error pages to advertising  Cannot access password-protected sites

10 Examples of spyware Examples of Programs distrubuted with spyware: DivX DivX FlastGet (free version) FlastGet (free version) DAEMON Tools DAEMON Tools Bearshare Bearshare and more …

11 Legality Not illegal in any way Not illegal in any way User may prefer not to use those products User may prefer not to use those products Places like Washington passed laws, people other than the owner or operator Places like Washington passed laws, people other than the owner or operator  illegal to install software- altering Web-browser settings, disable computer-security software

12 Prevention and Remedies A number of techniques emerged to  remove spyware  block spyware  reduce the chance of getting spyware Simplest remedies: back up user data back up user data Reinstall the OS Reinstall the OS

13 Prevention and Remedies Anti-spyware programs Anti-spyware programs Work in two ways: Work in two ways: 1.Real-time protection 2.Detection and removal Examples: Lavasoft ’ s Ad-Aware SE, Spybot_Search & Destroy, spy sweeper and more Examples: Lavasoft ’ s Ad-Aware SE, Spybot_Search & Destroy, spy sweeper and more Screenshot of Lavasoft ’ s Ad-Aware SE

14 Prevention and Remedies Virtual Machine Virtual Machine  inhibit infection  provide separate environment  spyware enters the virtual environment  host computer unaffected

15 Situation in Hong Kong

16 Situation in Hong Kong Front-line staff Front-line staff  little knowledge on spyware A serious problem to solve A serious problem to solve Companies should focus on this Companies should focus on this

17 Remember Always use computers with awareness!! The End


Download ppt "Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A."

Similar presentations


Ads by Google