1 / 38

Protect Against Spywares – SpywareBlaster

Protect Against Spywares – SpywareBlaster. Content. Introduction – - What is Spyware? - Danger - Sign of Trouble Solution Cleaning -- Spybot Protection -- SpywareBlaster Evaluation & Conclusion. Introduction.

milla
Download Presentation

Protect Against Spywares – SpywareBlaster

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Protect AgainstSpywares – SpywareBlaster

  2. Content • Introduction – - What is Spyware? - Danger - Sign of Trouble • Solution • Cleaning -- Spybot • Protection -- SpywareBlaster • Evaluation & Conclusion

  3. Introduction • Prevention is better than cure – SpywareBlaster prevents the installations of spywares as well as the running of the installed spywares

  4. What is spyware? • According to spywareinfo.com, spyware is software or hardware installed on a computer without the knowledge and the consent of the users. These components gather information about the user for later retrieval by whoever controls the spyware. • If the spywares aim at marketing some product or services, they are called adware.

  5. Danger The threat can be categorized as follows:- Annoyance; profile users, fairly easy to remove Threat; profile users and broadcast data back to a server, removal is not easy Dangerous; logs activity, open communication ports, difficult to remove, may contain security flaw and/or anti-spy counter measures Extremely dangerous; logs activity, open communication ports, high possibility of potential system damage or security flaw, may attempt to disable anti-virus or firewall programs.

  6. Sign of Trouble • System is slow • Mysterious new toolbar in browser • Advertising windows pop up even when not browsing the web • Surprise 900-number charges on phone bill

  7. Solution Game plan:- - clean up the system (with Spybot) - take a snapshot of the system in its clean state - run SpywareBlaster to protect the system - periodically restore the system to its clean state to preserve integrity

  8. Cleaning with Spybot • A free software from http://www.safer-networking.org/ to detect and remove spywares • Allow recovery • Provide immunization

  9. I. Search and destroy

  10. List the problems found

  11. The result is colour-coded • Red entries – problems that should be fixed to avoid security and/or privacy problems • Black entries – system internals, better remain untouched • Green entries -- indicate usage tracks, may be removed.

  12. Remove the threats • Select Fix selected problems

  13. System is cleaned

  14. II. Possible recovery • A list of back-ups is provided.

  15. III. Immunization • To prevent future spyware installation

  16. Protection -- SpywareBlaster • http://www.javacoolsoftware.com • SpywareBlaster creates a snapshot (an image of various browser and system settings) of the computer in its clean state. • Protect the system from installation of spywares and action of installed spywares by setting a “kill bit” for spyware ActiveX controls • Snapshot can be restored, changes and additions detected will be reported to provide full control

  17. 1. Creating a snapshot • Run SpywareBlaster. Select System Snapshotthen Create a System Snapshot • Choose a meaningful name for the snapshot such as after_cleaning, nothreat, and etc.

  18. 2. Protect the system • Current list of problematic spywares and tracking cookies is provided. The ones displayed in red are the one that the computer is not protected against. • User can choose the ones to be protected against. Press “Select All” or manually make the selection. • Press “Protect Against Checked Items” button.

  19. Information about the spyware/cookies is available. Select More Info on Items

  20. 3. Restoring the system • Select System Snapshot choose Restore system Snapshot

  21. Select a snapshot

  22. Changes and additions will be reported

  23. 4. Other options • Settings

  24. Tools 1. Brower Pages – allow changes to the settings

  25. Hosts Safe – Encrypted backup copies of the Hosts file. Can be restored by “Restore Saved Backup

  26. 3. Misc. Internet Explorer Settings – edit Internet Explorer settings

  27. 4. Flash Killer – Provides the option to set the kill bit for the Macromedia Flash control (versions 4.x, 5.x, or 6.x).

  28. 5. Custom Blocking – Allows customization of the list of ActiveX controls to be blocked.

  29. Updates SpywareBlaster can be effective only if the threats are known, thus it is important to update the database frequently

  30. Information on spyware/adware • Wilders.org  http://www.wilders.org • SpywareInfo http://www.spywareinfo.com • Doxdesk.com  http://www.doxdesk.com

  31. Evaluation • SpywareBlaster can protect a system only if it is possible to reach the clean state, not contaminated by surveillance programs. • Spybot Search & Destroy was known to be unable to find and remove keyloggers.1

  32. Conclusion • Spywares, or serveillance programs, remain a major security issue. They are capable of invading a computer system, tracks users’ keystrokes and thus gain control of the systems. • The Software principles Yielding Better Levels of Consumer Knowledge (SPYBLOCK) Act was introduced in US Congress. The act would make downloading and installing software without alerting the user illegal.2

  33. Critics would like to add provision to provide avenue for the users to take legal actions against companies that create and use spywares. • The Federal Trade Commission plans a workshop on spyware in mid-April !!

  34. References • Scott Spanbauer, “Fight Back Against Surveillance Software”, PC World Magazine, April 2004 issue (Posted Thursday, February 26, 2004). • Adrienne Newell, “Anti-Spyware Law Proposed”, Medill News Service, February 26, 2004

More Related