370 likes | 1.27k Views
Adware, Spyware, and Malware. Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005. Overview. Background Info Adware Spyware Malware Laboratory Info Motivation Procedure. Adware: Examples. Adware: Definition.
E N D
Adware, Spyware, and Malware • Anand Dedhia • Bharath Raj • ECE 4112 Project • 28 April 2005
Overview • Background Info • Adware • Spyware • Malware • Laboratory Info • Motivation • Procedure
Adware: Definition • Adware is simply an application that displays advertisements while it is running. • Adware is advertising supported software. • Adware contains a disclosure statement in the End User License Agreement stating its intentions.
Adware: Hazards • Installs separate advertising components on your system that downloads ads and wastes system resources even after the associated program is removed. • Some applications connect to ad servers over the Internet and consume network bandwidth while potentially compromising the security of your info.
Adware: Solutions • Install and run anti-adware tools like Ad-Aware.
Spyware: Definition • Spyware is a generic term describing software whose purpose is to collect demographic and usage information (name, email address, website visits) from your computer, usually for advertising and marketing purposes. • Spyware gathers the information covertly without the user’s knowledge.
Spyware: Hazards • Install separate components on your system as well, but records keystrokes and other information which can contain sensitive materials like username & password, credit card numbers, etceteras. • The spyware uses routines to mail out these logs and activities via email or posting it to a certain page on the web, so attackers can view them at anytime.
Spyware: Solutions • Install and run anti-spyware software like Spybot.
Malware: Examples • Worms/Bugs • Trojans • Viruses
Malware: Definition • Malware, or malicious software, is any software developed for the purpose of doing harm to a computer system. • Malware is the most dangerous of these programs since it has the potential to destroy one’s computer system.
Malware: Hazards • Worms and viruses can self-replicate and are usually hidden in executable files or parts of applications that can cause extensive damage to a computer system. • A trojan horse is harmful code disguised as a legitimate program that can cause malfunctions in a system and even allow a stranger to overtake your computer.
Malware: Solutions • Install and run antivirus software and use a firewall to prevent them from gaining access.
Motivation • Due to the prominence and severity in network security caused by these types of applications, a network administrator should know how to catch and remove these programs before they have the chance of compromising a system’s security.
What you will do in the lab • Adware • Program an adware application. • Spyware • Use Email SpyPro to send duplicate copies of all email to another address. • Use Etherscout to record and analyze traffic on a network. • Malware • Show the risks in Malwhere. • Prevention • Google Toolbar use to prevent the above. • Spy Doctor
Private myIE Dim WSHShell for i= 0 to 1 Set myIE = CreateObject("InternetExplorer.Application") myIE.Navigate "F:\School\ece 4112\popup.html" 'myIE.ToolBar = True 'myIE.StatusBar = False myIE.AddressBar = True myIE.MenuBar = True myIE.Resizable = True myIE.TheaterMode = False Do Loop While myIE.Busy myIE.Width = 1024 myIE.Height = 740 myIE.Left = 0 myIE.Top = 0 myIE.Visible = True Set WSHShell = WScript.CreateObject("WScript.Shell") WshShell.AppActivate("Microsoft Internet Explorer") Set WSHShell = Nothing Wscript.Sleep(3 * 1000) next Source Code