390 likes | 564 Views
What is Spyware?. Where did it come from?. Adware. Originated from software called shareware Shareware did not work well, so as the internet became popular, it evolved into adware Adware was shareware that supported itself by displaying advertisements Gator Kazaa. Adware.
E N D
What is Spyware? Where did it come from?
Adware • Originated from software called shareware • Shareware did not work well, so as the internet became popular, it evolved into adware • Adware was shareware that supported itself by displaying advertisements • Gator • Kazaa
Adware • Advertisers wanted to better target ads to people using these programs, so they began to “collect” usage information • The term for this became “spyware” • Advertisers began devising more and more intrusive ways to display advertisements • Adware switched from programs supported by advertisements to advertisements supported by programs
Spyware • Instead of coming with a program that serves a useful purpose, most spyware now seeks to merely get on your computer for the sole purpose of displaying advertisments • This includes displaying pop-ups when you shouldn’t get them, your web browser being “hijacked”, and many other things that shouldn’t happen.
Spyware • The official definition of spyware is: Software that transmits information back to a third party without notifying the user. It is also called malware, trackware, hijackware, scumware, snoopware or thiefware. Note: Some privacy advocates also call legitimate access control, filtering, Internet monitoring, password recovery, security or surveillance software "Spyware" because it could be used without notifying the users.
Spyware • It is believed that currently 9 out of 10 PCs that are connected to the internet are now infected by spyware • An unpatched PC connected to the internet can be infected in as little as 4 minutes • So how can someone protect themselves from spyware?
Basic Measure Updates, Virus Scanners, and Firewalls
Anti-Virus • Everyone should have anti-virus software on their computer! • Run at least once per week, along with other measures to keep your computer safe and working correctly • Anti-Spyware tools (covered later) • Hiram College provides anti-virus software for you • E-Trust software http://home.hiram.edu/eTrust/download.html
Windows Updates • What it does: Updates software on your computer to plug up security holes in Windows products • Select it from the start menu • Automatic updating • Should be run as often as anti-virus software is used • Service Pack 2
What you need to know about Service Pack 2 • Windows Security Center, which includes: • Quick-and-easy automatic updates options • Pop-up blocker • Monitoring of anti-virus protection • Software firewall
Firewalls • Keeps unauthorized users from entering your system • Hardware and Software based firewalls
More on Firewalls • No need to worry if you’re on the Hiram network • Should be used otherwise – easy to use and you can work around them if you need to
Anti-Spyware Tools AdAware, Spybot, and MS AntiSpyware
Anti-Spyware Tools • AdAware, Spybot, and MS AntiSpyware are all free tools that scan for and remove spyware • These three are also the most powerful • We will show you how to use these tools in this section
AdAware • http://www.lavasoftusa.com/ • Free version available (AdAware SE Personal) • Professional version also available
Spybot • http://www.spybot.info/ • Completely Free of Charge
Microsoft AntiSpyware • http://www.microsoft.com/athome/security/spyware/software/default.mspx • Formerly Giant AntiSpyware • Free of charge
Other tools • Noteworthy commercial products: • AdAware SE Professional • Webroot SpySweeper • Trusted sources of information (and updated software): • http://www.download.com/ • http://www.spychecker.com/
Advanced Removal Safe Mode, Regedit, and Bazooka
Advanced Spyware Removal • Windows Safe Mode • The Windows Registry • Manual Spyware Removal (with Bazooka)
Windows Safe Mode • Safe Mode – what is it? • Only loads minimal Windows functions for Windows to run. • User must manually start any programs they wish to use. • Allows anti-spyware scanners to remove spyware more effectively. • Our instructions are for Windows XP
How to Access Windows Safe Mode • Update all anti-spyware scanners with current definitions. • Turn off System Restore. • (Instructions coming next!) • Reboot the computer. • Tap the F8 key about twice per second as the computer reboots.
Accessing Windows Safe Mode continued • Select the first option, Safe Mode, and press enter. • When Windows starts, run anti-spyware scanners.
The Windows Registry • Windows Registry – what is it? • A database of configuration files needed to run Windows and programs • Some spyware must manually be removed from the registry • Use Google to search for instructions on how to remove the spyware **A word of caution when using the registry!**
How to Access the Windows Registry • Click on ‘Start’, and then click on ‘Run’. • Type ‘regedit’ and click ‘Ok’. • Follow the instructions for removing the spyware by expanding the hierarchical folders in the left column.
Bazooka Removal Tool • Free software • http://www.kephyr.com/ • Advanced removal tool (often requires using regedit)
Additional Measures Other things to keep you safe
1: Use a pop-up blocker • Pop-up blockers stop pop-up ads from being displayed on your screen. • Windows XP Service Pack 2 adds a pop-up blocker to Internet Explorer. • If you are not using Windows XP, Google makes a pop-up blocker too. You can download it at http://www.google.com/downloads/
2: Turn off dangerous features • Internet Explorer allows the use of Active X for displaying certain content • Unfortunately Active X can be very dangerous if used for malicious purposes • You can disable Active X in the security settings of Internet Explorer • You may wish to disable other features as well • There is a better option than crippling your features
3: Use a different Web Browser • Internet Explorer is currently the most commonly used web browser • That means it is the ideal target for spyware manufacturers • If they can find an exploit in it, they can target the most number of people
3: Use a different Web Browser • By using a different web browser you avoid most of these mainstream exploits • Firefox is an example of a browser alternative that an individual can use • It is free from http://www.mozilla.org • Another free browser is Opera (http://www.opera.com)
3: Use a different Web Browser • Alternate browsers also include other features you may find useful • Most web browser alternatives include pop-up blockers • Some even have features for removing advertisements all together
4. Be Alert • Many virus writers use simple tricks like misdirection • http://cs.hiram.edu/ • Double check your sources and make sure that the link is going where you think it is
Questions? • See this information (and more) at http://cs.hiram.edu/ • Feel Free to contact us at HCACM@hiram.edu