by donny gray katrina winters deondrick pina alex napper n.
Skip this Video
Loading SlideShow in 5 Seconds..
By: Donny Gray Katrina Winters Deondrick Pina Alex Napper PowerPoint Presentation
Download Presentation
By: Donny Gray Katrina Winters Deondrick Pina Alex Napper

play fullscreen
1 / 13

By: Donny Gray Katrina Winters Deondrick Pina Alex Napper

90 Views Download Presentation
Download Presentation

By: Donny Gray Katrina Winters Deondrick Pina Alex Napper

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Spyware By: Donny Gray Katrina Winters DeondrickPina Alex Napper

  2. History • The word 'spyware' was used for the first time publicly in October 1995. • It popped up on Usenet (a distributed Internet discussion system in which users post e-mail like messages) in an article aimed at Microsoft's business model.

  3. What is Spyware • Spyware refers to programs that use your Internet connection to send information from your personal computer to some other computer, normally without your knowledge or permission. • This information is a record of your ongoing browsing habits, downloads, or it could be more personal data like your name and address.

  4. How it infects your computer • Most spyware is installed without users' knowledge. • Spyware gets on a system through deception of the user or through exploitation of software vulnerabilities. • Most of the time it is bundled with some sort of other software that the user has downloaded.

  5. Effects and Behaviors • A spyware infestation can create significant unwanted CPU activity, disk usage, and network traffic. • Stability issues, such as applications freezing, failure to boot, and system-wide crashes, are also common. • Spyware, which interferes with networking software commonly causes difficulty connecting to the Internet.

  6. Types • Some types of spyware disable software firewalls and anti-virus software, and/or reduce browser security settings, thus opening the system to further opportunistic infections, much like an immune deficiency disease. • Some other types of spyware use rootkit like techniques to prevent detection, and thus removal.

  7. Remedies and Prevention • Spyware is still changing, meaning remedies can vary from different types of spyware. • If programs do not work to rid the computer of the infected then a full system reinstall would be needed. • Most big anti-virus firms have added anti-spyware to their anti-virus packages. (Such as Macafeeand Symantec)

  8. There are two things an anti-spyware program can do to protect you. 1. They can provide real time protection against the installation of spyware software on your computer. 2. Anti-spyware software programs can be used solely for detection and removal of spyware software that has already been installed onto your computer.

  9. Examples of Spyware Programs • CoolWebSearch • Internet Optimizer • HuntBar • Movieland • MyWebSearch • Zango • WeatherStudio

  10. Examples of Anti-Spyware Programs • Ad-Aware SE • Spybot - Search & Destroy • GIANT AntiSpyware • AVG Anti-Spyware Professional Edition