1 / 39

What is Spyware?

What is Spyware?. Where did it come from?. Adware. Originated from software called shareware Shareware did not work well, so as the internet became popular, it evolved into adware Adware was shareware that supported itself by displaying advertisements Gator Kazaa. Adware.

Download Presentation

What is Spyware?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. What is Spyware? Where did it come from?

  2. Adware • Originated from software called shareware • Shareware did not work well, so as the internet became popular, it evolved into adware • Adware was shareware that supported itself by displaying advertisements • Gator • Kazaa

  3. Adware • Advertisers wanted to better target ads to people using these programs, so they began to “collect” usage information • The term for this became “spyware” • Advertisers began devising more and more intrusive ways to display advertisements • Adware switched from programs supported by advertisements to advertisements supported by programs

  4. Spyware • Instead of coming with a program that serves a useful purpose, most spyware now seeks to merely get on your computer for the sole purpose of displaying advertisments • This includes displaying pop-ups when you shouldn’t get them, your web browser being “hijacked”, and many other things that shouldn’t happen.

  5. Spyware • The official definition of spyware is: Software that transmits information back to a third party without notifying the user. It is also called malware, trackware, hijackware, scumware, snoopware or thiefware. Note: Some privacy advocates also call legitimate access control, filtering, Internet monitoring, password recovery, security or surveillance software "Spyware" because it could be used without notifying the users.

  6. Spyware • It is believed that currently 9 out of 10 PCs that are connected to the internet are now infected by spyware • An unpatched PC connected to the internet can be infected in as little as 4 minutes • So how can someone protect themselves from spyware?

  7. Basic Measure Updates, Virus Scanners, and Firewalls

  8. Anti-Virus • Everyone should have anti-virus software on their computer! • Run at least once per week, along with other measures to keep your computer safe and working correctly • Anti-Spyware tools (covered later) • Hiram College provides anti-virus software for you • E-Trust software http://home.hiram.edu/eTrust/download.html

  9. Windows Updates • What it does: Updates software on your computer to plug up security holes in Windows products • Select it from the start menu • Automatic updating • Should be run as often as anti-virus software is used • Service Pack 2

  10. What you need to know about Service Pack 2 • Windows Security Center, which includes: • Quick-and-easy automatic updates options • Pop-up blocker • Monitoring of anti-virus protection • Software firewall

  11. Firewalls • Keeps unauthorized users from entering your system • Hardware and Software based firewalls

  12. More on Firewalls • No need to worry if you’re on the Hiram network • Should be used otherwise – easy to use and you can work around them if you need to

  13. Anti-Spyware Tools AdAware, Spybot, and MS AntiSpyware

  14. Anti-Spyware Tools • AdAware, Spybot, and MS AntiSpyware are all free tools that scan for and remove spyware • These three are also the most powerful • We will show you how to use these tools in this section

  15. AdAware • http://www.lavasoftusa.com/ • Free version available (AdAware SE Personal) • Professional version also available

  16. Spybot • http://www.spybot.info/ • Completely Free of Charge

  17. Microsoft AntiSpyware • http://www.microsoft.com/athome/security/spyware/software/default.mspx • Formerly Giant AntiSpyware • Free of charge

  18. Other tools • Noteworthy commercial products: • AdAware SE Professional • Webroot SpySweeper • Trusted sources of information (and updated software): • http://www.download.com/ • http://www.spychecker.com/

  19. Advanced Removal Safe Mode, Regedit, and Bazooka

  20. Advanced Spyware Removal • Windows Safe Mode • The Windows Registry • Manual Spyware Removal (with Bazooka)

  21. Windows Safe Mode • Safe Mode – what is it? • Only loads minimal Windows functions for Windows to run. • User must manually start any programs they wish to use. • Allows anti-spyware scanners to remove spyware more effectively. • Our instructions are for Windows XP

  22. How to Access Windows Safe Mode • Update all anti-spyware scanners with current definitions. • Turn off System Restore. • (Instructions coming next!) • Reboot the computer. • Tap the F8 key about twice per second as the computer reboots.

  23. Accessing Windows Safe Mode continued • Select the first option, Safe Mode, and press enter. • When Windows starts, run anti-spyware scanners.

  24. Turning off System Restore

  25. The Windows Registry • Windows Registry – what is it? • A database of configuration files needed to run Windows and programs • Some spyware must manually be removed from the registry • Use Google to search for instructions on how to remove the spyware **A word of caution when using the registry!**

  26. How to Access the Windows Registry • Click on ‘Start’, and then click on ‘Run’. • Type ‘regedit’ and click ‘Ok’. • Follow the instructions for removing the spyware by expanding the hierarchical folders in the left column.

  27. Bazooka Removal Tool • Free software • http://www.kephyr.com/ • Advanced removal tool (often requires using regedit)

  28. Sample of Bazooka Instructions

  29. Additional Measures Other things to keep you safe

  30. 1: Use a pop-up blocker • Pop-up blockers stop pop-up ads from being displayed on your screen. • Windows XP Service Pack 2 adds a pop-up blocker to Internet Explorer. • If you are not using Windows XP, Google makes a pop-up blocker too. You can download it at http://www.google.com/downloads/

  31. 2: Turn off dangerous features • Internet Explorer allows the use of Active X for displaying certain content • Unfortunately Active X can be very dangerous if used for malicious purposes • You can disable Active X in the security settings of Internet Explorer • You may wish to disable other features as well • There is a better option than crippling your features

  32. 3: Use a different Web Browser • Internet Explorer is currently the most commonly used web browser • That means it is the ideal target for spyware manufacturers • If they can find an exploit in it, they can target the most number of people

  33. 3: Use a different Web Browser • By using a different web browser you avoid most of these mainstream exploits • Firefox is an example of a browser alternative that an individual can use • It is free from http://www.mozilla.org • Another free browser is Opera (http://www.opera.com)

  34. 3: Use a different Web Browser • Alternate browsers also include other features you may find useful • Most web browser alternatives include pop-up blockers • Some even have features for removing advertisements all together

  35. 4. Be Alert • Many virus writers use simple tricks like misdirection • http://cs.hiram.edu/ • Double check your sources and make sure that the link is going where you think it is

  36. Questions? • See this information (and more) at http://cs.hiram.edu/ • Feel Free to contact us at HCACM@hiram.edu

More Related