SlideShare uma empresa Scribd logo
1 de 18
Spyware and AdwareSpyware and Adware
Presented By:Presented By:
D.NaveenaD.Naveena
11731A051311731A0513
ContentsContents

What is Spyware?What is Spyware?

What is Adware?What is Adware?

How does Spyware and Adware work?How does Spyware and Adware work?

How to detect if your computer hasHow to detect if your computer has
Spyware/Adware?Spyware/Adware?

What programs are there to help get rid ofWhat programs are there to help get rid of
them?them?

RecommendationsRecommendations
What is Spyware and Adware?What is Spyware and Adware?
Both areBoth are independent programsindependent programs
that can be automatically installedthat can be automatically installed
when you surf the internet orwhen you surf the internet or
when you install free software.when you install free software.
MostMost adwareadware isis spywarespyware in ain a
different sense than "advertising-different sense than "advertising-
supported software," for asupported software," for a
different reason: it displaysdifferent reason: it displays
advertisements related to what itadvertisements related to what it
finds from spying on you.finds from spying on you.
What is Spyware?What is Spyware?
Spyware - is computer software which is installed
surreptitiously on a personal computer; it takes partial
control over the user's computer, without the user's
informed consent.
Collect various types of personal information - such as
Internet surfing habits, visited sites, can also interfere
installing additional software and redirecting Web
browser activity.
Spyware is known to change computer settings, resulting
in slow connection speeds, loss of Internet or functionality
of other programs.
AdwareAdware is any software package which automatically plays,is any software package which automatically plays,
displays, or downloads advertisements to a computer after thedisplays, or downloads advertisements to a computer after the
software is installed on it or while the application is being used.software is installed on it or while the application is being used.
Comes in the form ofComes in the form of popupspopups and unexplainedand unexplained
advertising programsadvertising programs on your computer.on your computer.
Also aAlso a LEGAL programLEGAL program!!
Adware are created byAdware are created by advertising companiesadvertising companies..
What is Adware?What is Adware?
Advertising companiesAdvertising companies
hope to generate moneyhope to generate money
from customers whofrom customers who
receive thereceive the popupspopups oror
unexplained programsunexplained programs onon
their computers.their computers.
Well-known adwareWell-known adware
programs-programs-
123 Messenger123 Messenger
AOL Instant MessengerAOL Instant Messenger
DivXDivX
Micro AntivirusMicro Antivirus
RealPlayerRealPlayer
Routes of infectionRoutes of infection
Spyware and Adware programs have a tendency to hide asSpyware and Adware programs have a tendency to hide as cookiecookie
oror temporary internet filestemporary internet files..
Ways-Ways-
Malicious websitesMalicious websites install spyware on readers' computers.install spyware on readers' computers.
Another way of distributing spyware involves tricking users byAnother way of distributing spyware involves tricking users by
manipulating security featuresmanipulating security features designed to prevent unwanteddesigned to prevent unwanted
installations.installations.
In a few cases, aIn a few cases, a wormworm oror virusvirus has delivered ahas delivered a spyware payloadspyware payload..
Some attackers used the Spybot worm to install spyware that putSome attackers used the Spybot worm to install spyware that put
pornographic pop-ups on the infected system's screen. Bypornographic pop-ups on the infected system's screen. By
directing traffic to ads, the spyware-makers funds author ofdirecting traffic to ads, the spyware-makers funds author of
website, which profits them personally.website, which profits them personally.
How to detect that your computer has spyware orHow to detect that your computer has spyware or
adware…adware…
ContinuousContinuous popupspopups..
PersistentPersistent changechange in yourin your
homepagehomepage..
Slower computer processingSlower computer processing,,
takes the computer longer totakes the computer longer to
process or startup.process or startup.
Extreme symptoms of spyware or adware…Extreme symptoms of spyware or adware…
A spyware program is rarelyA spyware program is rarely
alone on a computer: an affectedalone on a computer: an affected
machine usually hasmachine usually has multiplemultiple
infectionsinfections..
Internet browserInternet browser does not start up.does not start up.
Parts of your computer youParts of your computer you
cannot access withoutcannot access without freezingfreezing..
Major core data isMajor core data is lostlost oror
changedchanged..
What programs are there to help get rid ofWhat programs are there to help get rid of
spyware/adwarespyware/adware??
Out of many programs out in the internet that wereOut of many programs out in the internet that were
created to detect spyware/adware, four programscreated to detect spyware/adware, four programs
were chosen for this presentation.. They are:were chosen for this presentation.. They are:
Spybot Search and DestroySpybot Search and Destroy
SpysweeperSpysweeper
Symantec AntiVirusSymantec AntiVirus
Ad-aware 6.0Ad-aware 6.0
Spybot Search and DestroySpybot Search and Destroy
Type: Spyware KillerType: Spyware Killer
Advantages:Advantages:

Has aHas a Recovery featureRecovery feature thatthat
allows you to restore any filesallows you to restore any files
you may be deleted infected withyou may be deleted infected with
spywarespyware

Has anHas an Immunity featureImmunity feature thatthat
protects you from already knownprotects you from already known
spywaresspywares
Disadvantages:Disadvantages:

Infrequent updates causeInfrequent updates cause
spywares to slip past scans andspywares to slip past scans and
immunityimmunity
Spy SweeperSpy Sweeper
Type: Spyware/ Adware (FreeType: Spyware/ Adware (Free
Version)Version)
Advantages:Advantages:

Has aHas a immunity shieldimmunity shield thatthat
blocks known spywares.blocks known spywares.
Disadvantages:Disadvantages:

Takes a while to scan.Takes a while to scan.

Unless you pay for the Spy-Unless you pay for the Spy-
Sweeper, it does not come withSweeper, it does not come with
definition updates.definition updates.
Comments:Comments:

Effective program, onlyEffective program, only
backdraw is the payment youbackdraw is the payment you
need to make yearly to keep theneed to make yearly to keep the
program updated.program updated.
Norton Symantec AntiVirusNorton Symantec AntiVirus
Type: Virus/ Spyware/ AdwareType: Virus/ Spyware/ Adware
Advantages:Advantages:
Can detectCan detect virusesviruses,, hackinghacking
programsprograms,, spyware programsspyware programs,,
adware programsadware programs, etc., etc.
Comes with a firewall.Comes with a firewall.
Disadvantages:Disadvantages:
Detects very fewDetects very few
adware/spyware programsadware/spyware programs
Very confusing to use.Very confusing to use.
Comments:Comments:
Norton Symantec still has waysNorton Symantec still has ways
to go in detectingto go in detecting
adware/spyware programsadware/spyware programs
Ad-aware 6.0Ad-aware 6.0
Type: AdwareType: Adware
Advantages:Advantages:
•
EasyEasy to use scanning.to use scanning.
•
Detailed logs of where theDetailed logs of where the
adware and spyware programsadware and spyware programs
areare hiddenhidden..
Disadvantages:Disadvantages:
•
Ad-aware was built forAd-aware was built for
adware, so its ability to catchadware, so its ability to catch
spyware is restrictedspyware is restricted
Comments:Comments:
•
Effective Program. A bit onEffective Program. A bit on
thethe costlycostly side but its wellside but its well
worth it.worth it.
RecommendationsRecommendations
Preventing spyware and adware from getting onto your computerPreventing spyware and adware from getting onto your computer
is your first step!is your first step!

Do notDo not downloaddownload unnecessary software from theunnecessary software from the
internet, especially free ones because they most likelyinternet, especially free ones because they most likely
have adware or spyware inside them.have adware or spyware inside them.

If a download screen appears, asking you to confirmIf a download screen appears, asking you to confirm
your download,your download, click noclick no if you are not trying to installif you are not trying to install
anything.anything.

Avoid clickingAvoid clicking advertised popupsadvertised popups especially ones thatespecially ones that
mention “free” stuff if possible.mention “free” stuff if possible.
Recommendations contd..Recommendations contd..
Technical RecommendationsTechnical Recommendations
Disable saving of temporary filesDisable saving of temporary files
ConstantlyConstantly delete old temporary filesdelete old temporary files andand
cookiescookies
Always constantlyAlways constantly scanscan youryour computercomputer forfor
adware and spyware and keep youradware and spyware and keep your
Adware/Spyware killer programs fully updatedAdware/Spyware killer programs fully updated
at all times.at all times.
ConclusionConclusion
Unfortunately, spyware and adware aren't
going away any time soon. But you can take
control by deciding what gets in, what stays
out, and what remains on your computer.
Spyware and  adware

Mais conteúdo relacionado

Mais procurados

Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics OverviewYansi Keim
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsFilip Maertens
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Anpumathews
 
Encase Forensic
Encase ForensicEncase Forensic
Encase ForensicMegha Sahu
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - NotesKranthi
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and InvestigationNeha Raju k
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolsN.Jagadish Kumar
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 

Mais procurados (20)

Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Malware forensics
Malware forensicsMalware forensics
Malware forensics
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
 
Encase Forensic
Encase ForensicEncase Forensic
Encase Forensic
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
 
Forensics Analysis and Validation
Forensics Analysis and Validation  Forensics Analysis and Validation
Forensics Analysis and Validation
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software tools
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 

Destaque (11)

Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
spyware
spywarespyware
spyware
 
Spyware
SpywareSpyware
Spyware
 
Spyware
SpywareSpyware
Spyware
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewalls
 
Phishing & Pharming
Phishing & PharmingPhishing & Pharming
Phishing & Pharming
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Spyware
SpywareSpyware
Spyware
 
Firewall
Firewall Firewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 

Semelhante a Spyware and adware

Semelhante a Spyware and adware (20)

Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
Spyware
SpywareSpyware
Spyware
 
Spyware
SpywareSpyware
Spyware
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Anti-virus software and spyware
Anti-virus software and spywareAnti-virus software and spyware
Anti-virus software and spyware
 
Adware
AdwareAdware
Adware
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Spyware
SpywareSpyware
Spyware
 
IT viruses
 IT viruses IT viruses
IT viruses
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Adware and Browser Hijacker - Symptoms and Prevention
Adware and Browser Hijacker - Symptoms and PreventionAdware and Browser Hijacker - Symptoms and Prevention
Adware and Browser Hijacker - Symptoms and Prevention
 
Antivirus
AntivirusAntivirus
Antivirus
 
DEFINING A SPYWARE
DEFINING A SPYWAREDEFINING A SPYWARE
DEFINING A SPYWARE
 
Mischievous Malware
Mischievous MalwareMischievous Malware
Mischievous Malware
 
Virus removal
Virus removalVirus removal
Virus removal
 
Anti virus software
Anti virus softwareAnti virus software
Anti virus software
 
Topic 12 internet security
Topic 12 internet securityTopic 12 internet security
Topic 12 internet security
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
 
Spyware
SpywareSpyware
Spyware
 

Último

BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spaintimesproduction05
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 

Último (20)

(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 

Spyware and adware

  • 1. Spyware and AdwareSpyware and Adware Presented By:Presented By: D.NaveenaD.Naveena 11731A051311731A0513
  • 2. ContentsContents  What is Spyware?What is Spyware?  What is Adware?What is Adware?  How does Spyware and Adware work?How does Spyware and Adware work?  How to detect if your computer hasHow to detect if your computer has Spyware/Adware?Spyware/Adware?  What programs are there to help get rid ofWhat programs are there to help get rid of them?them?  RecommendationsRecommendations
  • 3. What is Spyware and Adware?What is Spyware and Adware? Both areBoth are independent programsindependent programs that can be automatically installedthat can be automatically installed when you surf the internet orwhen you surf the internet or when you install free software.when you install free software. MostMost adwareadware isis spywarespyware in ain a different sense than "advertising-different sense than "advertising- supported software," for asupported software," for a different reason: it displaysdifferent reason: it displays advertisements related to what itadvertisements related to what it finds from spying on you.finds from spying on you.
  • 4. What is Spyware?What is Spyware? Spyware - is computer software which is installed surreptitiously on a personal computer; it takes partial control over the user's computer, without the user's informed consent. Collect various types of personal information - such as Internet surfing habits, visited sites, can also interfere installing additional software and redirecting Web browser activity. Spyware is known to change computer settings, resulting in slow connection speeds, loss of Internet or functionality of other programs.
  • 5. AdwareAdware is any software package which automatically plays,is any software package which automatically plays, displays, or downloads advertisements to a computer after thedisplays, or downloads advertisements to a computer after the software is installed on it or while the application is being used.software is installed on it or while the application is being used. Comes in the form ofComes in the form of popupspopups and unexplainedand unexplained advertising programsadvertising programs on your computer.on your computer. Also aAlso a LEGAL programLEGAL program!! Adware are created byAdware are created by advertising companiesadvertising companies.. What is Adware?What is Adware?
  • 6. Advertising companiesAdvertising companies hope to generate moneyhope to generate money from customers whofrom customers who receive thereceive the popupspopups oror unexplained programsunexplained programs onon their computers.their computers. Well-known adwareWell-known adware programs-programs- 123 Messenger123 Messenger AOL Instant MessengerAOL Instant Messenger DivXDivX Micro AntivirusMicro Antivirus RealPlayerRealPlayer
  • 7. Routes of infectionRoutes of infection Spyware and Adware programs have a tendency to hide asSpyware and Adware programs have a tendency to hide as cookiecookie oror temporary internet filestemporary internet files.. Ways-Ways- Malicious websitesMalicious websites install spyware on readers' computers.install spyware on readers' computers. Another way of distributing spyware involves tricking users byAnother way of distributing spyware involves tricking users by manipulating security featuresmanipulating security features designed to prevent unwanteddesigned to prevent unwanted installations.installations. In a few cases, aIn a few cases, a wormworm oror virusvirus has delivered ahas delivered a spyware payloadspyware payload.. Some attackers used the Spybot worm to install spyware that putSome attackers used the Spybot worm to install spyware that put pornographic pop-ups on the infected system's screen. Bypornographic pop-ups on the infected system's screen. By directing traffic to ads, the spyware-makers funds author ofdirecting traffic to ads, the spyware-makers funds author of website, which profits them personally.website, which profits them personally.
  • 8. How to detect that your computer has spyware orHow to detect that your computer has spyware or adware…adware… ContinuousContinuous popupspopups.. PersistentPersistent changechange in yourin your homepagehomepage.. Slower computer processingSlower computer processing,, takes the computer longer totakes the computer longer to process or startup.process or startup.
  • 9. Extreme symptoms of spyware or adware…Extreme symptoms of spyware or adware… A spyware program is rarelyA spyware program is rarely alone on a computer: an affectedalone on a computer: an affected machine usually hasmachine usually has multiplemultiple infectionsinfections.. Internet browserInternet browser does not start up.does not start up. Parts of your computer youParts of your computer you cannot access withoutcannot access without freezingfreezing.. Major core data isMajor core data is lostlost oror changedchanged..
  • 10. What programs are there to help get rid ofWhat programs are there to help get rid of spyware/adwarespyware/adware?? Out of many programs out in the internet that wereOut of many programs out in the internet that were created to detect spyware/adware, four programscreated to detect spyware/adware, four programs were chosen for this presentation.. They are:were chosen for this presentation.. They are: Spybot Search and DestroySpybot Search and Destroy SpysweeperSpysweeper Symantec AntiVirusSymantec AntiVirus Ad-aware 6.0Ad-aware 6.0
  • 11. Spybot Search and DestroySpybot Search and Destroy Type: Spyware KillerType: Spyware Killer Advantages:Advantages:  Has aHas a Recovery featureRecovery feature thatthat allows you to restore any filesallows you to restore any files you may be deleted infected withyou may be deleted infected with spywarespyware  Has anHas an Immunity featureImmunity feature thatthat protects you from already knownprotects you from already known spywaresspywares Disadvantages:Disadvantages:  Infrequent updates causeInfrequent updates cause spywares to slip past scans andspywares to slip past scans and immunityimmunity
  • 12. Spy SweeperSpy Sweeper Type: Spyware/ Adware (FreeType: Spyware/ Adware (Free Version)Version) Advantages:Advantages:  Has aHas a immunity shieldimmunity shield thatthat blocks known spywares.blocks known spywares. Disadvantages:Disadvantages:  Takes a while to scan.Takes a while to scan.  Unless you pay for the Spy-Unless you pay for the Spy- Sweeper, it does not come withSweeper, it does not come with definition updates.definition updates. Comments:Comments:  Effective program, onlyEffective program, only backdraw is the payment youbackdraw is the payment you need to make yearly to keep theneed to make yearly to keep the program updated.program updated.
  • 13. Norton Symantec AntiVirusNorton Symantec AntiVirus Type: Virus/ Spyware/ AdwareType: Virus/ Spyware/ Adware Advantages:Advantages: Can detectCan detect virusesviruses,, hackinghacking programsprograms,, spyware programsspyware programs,, adware programsadware programs, etc., etc. Comes with a firewall.Comes with a firewall. Disadvantages:Disadvantages: Detects very fewDetects very few adware/spyware programsadware/spyware programs Very confusing to use.Very confusing to use. Comments:Comments: Norton Symantec still has waysNorton Symantec still has ways to go in detectingto go in detecting adware/spyware programsadware/spyware programs
  • 14. Ad-aware 6.0Ad-aware 6.0 Type: AdwareType: Adware Advantages:Advantages: • EasyEasy to use scanning.to use scanning. • Detailed logs of where theDetailed logs of where the adware and spyware programsadware and spyware programs areare hiddenhidden.. Disadvantages:Disadvantages: • Ad-aware was built forAd-aware was built for adware, so its ability to catchadware, so its ability to catch spyware is restrictedspyware is restricted Comments:Comments: • Effective Program. A bit onEffective Program. A bit on thethe costlycostly side but its wellside but its well worth it.worth it.
  • 15. RecommendationsRecommendations Preventing spyware and adware from getting onto your computerPreventing spyware and adware from getting onto your computer is your first step!is your first step!  Do notDo not downloaddownload unnecessary software from theunnecessary software from the internet, especially free ones because they most likelyinternet, especially free ones because they most likely have adware or spyware inside them.have adware or spyware inside them.  If a download screen appears, asking you to confirmIf a download screen appears, asking you to confirm your download,your download, click noclick no if you are not trying to installif you are not trying to install anything.anything.  Avoid clickingAvoid clicking advertised popupsadvertised popups especially ones thatespecially ones that mention “free” stuff if possible.mention “free” stuff if possible.
  • 16. Recommendations contd..Recommendations contd.. Technical RecommendationsTechnical Recommendations Disable saving of temporary filesDisable saving of temporary files ConstantlyConstantly delete old temporary filesdelete old temporary files andand cookiescookies Always constantlyAlways constantly scanscan youryour computercomputer forfor adware and spyware and keep youradware and spyware and keep your Adware/Spyware killer programs fully updatedAdware/Spyware killer programs fully updated at all times.at all times.
  • 17. ConclusionConclusion Unfortunately, spyware and adware aren't going away any time soon. But you can take control by deciding what gets in, what stays out, and what remains on your computer.

Notas do Editor

  1. The first recorded use of the term spyware occurred on October 16, 1995 in a Usenet post that poked fun at Microsoft's business model Spyware at first denoted hardware meant for espionage purposes.