Skip to main content

ஸ்பைவேர்,உளவு மென்பொருள் நிரல்கள் என்ன செய்ய முடியும்?

What Are Spyware Programs? What Can Spyware Programs Do?

Spyware programs can accomplish a multitude of malicious tasks. Some of their deeds are simply annoying for the user; others can become downright aggressive in nature.
Spyware can:-
  • Monitor your keystrokes for reporting purposes.
  • Scan files located on your hard drive.
  • Snoop through applications on our desktop.
  • Install other spyware programs into your computer.
  • Read your cookies.
  • Steal credit card numbers, passwords, and other personal information.
  • Change the default settings on your home page web browser.
  • Mutate into a second generation of spyware thus making it more difficult to eradicate.
  • Cause your computer to run slower.
  • Deliver annoying pop up advertisements.
  • Add advertising links to web pages for which the author does not get paid. Instead, payment is directed to the spyware programmer that changed the original affiliate’s settings.
  •  Provide the user with no uninstall option and places itself in unexpected or hidden places within your computer making it difficult to remove
Examples of Spyware :-
Here are a few examples of commonly seen spyware programs:-
(Please note that while researchers will often give names to spyware programs,
they may not match the names the spyware-writers use.)
CoolWebSearch, a group of programs, that install through “holes” found in Internet Explorer. These programs direct traffic to advertisements on Web sites including coolwebsearch.com. This spyware nuisance displays pop-up ads, rewrites search engine results, and alters the computer host file to direct the Domain Name System (DNS) to lookup preselected sites.
Internet Optimizer (a/k/a DyFuCa), likes to redirect Internet Explorer error pages to advertisements. When the user follows the broken link or enters an erroneous URL, a page of advertisements pop up.
180 Solutions reports extensive information to advertisers about the Web sites which you visit. It also alters HTTP requests for affiliate advertisements linked from a Web site. Therefore the 180 Solutions Company makes an unearned
profit off of the click through advertisements they’ve altered.
HuntBar (a/k/a WinTools) or Adware.Websearch, is distributed by Traffic Syndicate and is installed by ActiveX drive-by downloading at affiliate websites or by advertisements displayed by other spyware programs. It’s a prime example of how spyware can install more spyware. These programs will add toolbars to Internet Explorer, track Web browsing behavior, and display advertisements.

 

Popular posts from this blog

Digital Visual Interface (DVI)

EDIMAX BR‐6428nC

Default settings of the EDIMAX BR‐6428nC Here you find the default IP address as well as the username and password for the user interface of the EDIMAX BR‐6428nC N300 Multi-Function Wi-Fi router. This site also contains information about the preconfigured Wi-Fi settings of the device. In the bottom part of this website, you will find a manual for accessing the user interface of this router and resetting its factory settings .

Intel

How Intel Got Its Name    Intel was founded in 1968 by two ex-Fairchild Semiconductor employees, Gordon E. Moore and Robert N. Noyce. The company was originally called "N M Electronics." Legend has it, their preferred name — "Moore Noyce Electronics" — sounded too similar to "more noise," not a great brand message in that industry. "Integrated Electronics" was considered as a possible name, but was taken, so the first syllables of each word were used instead. "Intel," described by Noyce as "sort of sexy," was eventually agreed upon. The pair then purchased the "Intel" trademark from the Intelco hotel chain for just $15,000. Intel Once Made Watches  In 1972, Intel moved into the jewelry market with the acquisition of digital watch maker Microma. At the time, digital watches were considered seriously high-tech, selling for hundreds of dollars, so the move was not a surprising one. The antici...