Unformatted text preview:

Spyware Study Prof. Robila CMPT 495 Computer and Data Security Group: Francis Rivera Douglas Schemly Igor Yussim Due: December 12, 20052 Table of Contents Topic Page Spyware and the History of 3 Spyware Prevention 6 Anti-Spyware 11 Works Cited 163 Francis Rivera CMPT 495 Prof. Robila Spyware and the History of Spyware is intrusive software that infects over ninety percent of the PC’s that are on the net. As a matter of fact, the computer that I’m using to write this paper is infected with Spyware. I have tried my best to get rid of it on my own, but I just do not want to spend the money for a good anti-spyware tool. So I live with it, just like many other people out there who do the same thing. But what is spyware and why is it so bad? Spyware, According to Microsoft is a general term used to describe software that “performs certain behaviors such as advertising, collecting personal information, or changing the configuration of your computer”. These actions are a personal intrusion into ones privacy and provide a danger financially and politically to people. Most of the time, you consent to having spyware on your machine in exchange for free software. However, the terms and agreements are often not portrayed in a manner that is understandable. That is way almost all of us always click I accept when installing downloaded software, without reading the terms of the agreement. How does spyware work? There are two main whys in which spyware works. The first way that I will discuss is Tracking Cookies. Tracking Cookies are cookies that are used to track web pages that are visited by the computer. That information is then sent to a server that will then send specific marketing pop-up ads according to the web pages that where visited. The signs that your computer has Tracking Cookies are that you receive many pop-up ads, even if you are not on the web, slower runtime and4 frequent computer crashes. The second Type of spyware that I will discuss is A Browser Hijacker. A Browser Hijacker is malicious software that changes your browser settings and usually adds unwanted toolbars. The way the Browser Hijacker then redirects you from the sites you want to other sites to artificially increase hits on that site, which increases revenue. You can tell if your computer has been browser hijacked by the changing of your homepage, being misdirected from the pages that you are trying to visit, and slower runtime and frequent crashes. In the second part of this paper I will discuss the history of spyware. The word spyware first appeared in 1996 on the Usenet. It was used to sarcastically point out Microsoft’s business strategies, according to PCsecurity.com. As a matter of fact the word spyware did not come to mean what we know it as today until the year 1999, when the first anti-spyware software came on the market called OptOut. Most people had there first experience with spyware when the popular free internet game called Elf Bowling came out in 1999. The software supposedly contained tracking software which was used to send data back to the games creator Nsoft. Weather this was true or not, it being said made the mass public aware that spyware existed and that it was a threat to their privacy. Though the general public did not become aware of spyware until 1999 what we now consider spyware today did exist before that. In 1998 the company NetZero was started. The idea was to provide people with free internet access in exchange for them displaying what NetZero called the ZeroPort. The ZeroPort which was developed by Dash is a small navigational toolbar that can never be closed. It displays advertisements to the person who is surfing the web. Also the material that is being searched on the web is being sent back to a central server where the information is analyzed so that the5 advertisements, which must remain on while the person is on the web, can be tailored to what that particular person is viewing. The idea was that the person who had NetZero would by the products that where advertised by the ZeroPort and a percentage of the proceeds would be sent to NetZero so that they could provide free internet and make a profit. In conclusion, what started out as a way to provide people with free internet access at the price of viewing the ZeroPort, turned into the most intrusive invasion of privacy known to man. Spyware is the new virus of computing. Though it does not replicate like a virus, it is as dangerous if not more. Spyware has the potential to cost a person very dearly, weather financially or politically.6 Douglas Schemly CMPT 495 Prof Robila Spyware Prevention Learning what spyware is one important step to fighting it. The next step is to learn ways to prevent spyware from being placed on your computer. There are five things that a person can do to help prevent spyware being installed on their computer. The five actions are safe surfing, adjusting your browser’s security settings, keeping your computer’s software updated, using firewalls, and using spyware prevention software. To understand these prevention steps involves a further look into what they mean. The first one safe surfing can be a crucial step in preventing spyware. What exactly does it mean to safely surf the net. First it means only go to the web sites you know and trust. Stay away from the strange sites, like porn sites, ones that are offering the free software or just the strange ones that people say have funny things on them. Many of these sites will ask you to download certain programs onto your computer and will attempt to do that. This leads to the next step people can take in safe surfing, which is to ignore and properly close pop ups. These pop up ads usually appear as some great software, a technical support message, or a security alert. These are called FUI’s (Fake user interfaces). Some other examples of these ads can be ones offering quicker downloads, a better search engine, or to the offer to remove spyware off your computer. The best bet is to ignore them and close these windows. A problem is though is that7 some of these pop ups have a face X or close tab that directs you to the site. That is why it is important to make sure you click on the right X or close tab. Another option is to


View Full Document

Montclair CMPT 495 - Spyware Study

Download Spyware Study
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Spyware Study and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Spyware Study 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?