Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.
-
date post
18-Dec-2015 -
Category
Documents
-
view
218 -
download
4
Transcript of Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.
![Page 1: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.](https://reader030.fdocuments.us/reader030/viewer/2022032703/56649d265503460f949fcb29/html5/thumbnails/1.jpg)
Computer Applications Computer Applications Reading SchemeReading Scheme
SpywareSpyware
Chan Yui Ming (6) L6AChan Yui Ming (6) L6A
![Page 2: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.](https://reader030.fdocuments.us/reader030/viewer/2022032703/56649d265503460f949fcb29/html5/thumbnails/2.jpg)
DefinitionDefinition
SpywareSpyware• Internet jargonInternet jargon• ProgrammingProgramming
put in someone’s computer secretlyput in someone’s computer secretlygather information of usergather information of usertake partial control of a computertake partial control of a computer
• For advertisers or other interested partiesFor advertisers or other interested parties
![Page 3: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.](https://reader030.fdocuments.us/reader030/viewer/2022032703/56649d265503460f949fcb29/html5/thumbnails/3.jpg)
Relation with AdwareRelation with Adware
• AdwareAdwareSoftware designed to Software designed to serve advertisingserve advertising
• Like a spywareLike a spywaretrackingtracking or or reportingreporting user information, user information,
without any notificationwithout any notification
![Page 4: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.](https://reader030.fdocuments.us/reader030/viewer/2022032703/56649d265503460f949fcb29/html5/thumbnails/4.jpg)
Relation with CookiesRelation with Cookies
• CookieCookiestore informationstore information about an Internet use about an Internet use
rr
• Unknown Web site may store informatioUnknown Web site may store information about you n about you SpywareSpyware
• Public concern Public concern
![Page 5: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.](https://reader030.fdocuments.us/reader030/viewer/2022032703/56649d265503460f949fcb29/html5/thumbnails/5.jpg)
Extra InformationExtra Information
When did spyware become popular?When did spyware become popular?
• 19991999
• By a popular computer game (Elf BowlinBy a popular computer game (Elf Bowling)g)
![Page 6: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.](https://reader030.fdocuments.us/reader030/viewer/2022032703/56649d265503460f949fcb29/html5/thumbnails/6.jpg)
How it enters your How it enters your computer?computer?
1)1) As a As a virusvirus
2)2) Installing a Installing a new programnew program withowithout the users knowing its existenceut the users knowing its existence
3)3) By By drive-by dowloadingdrive-by dowloading Spyware installed just by visiting a Web SiteSpyware installed just by visiting a Web Site
![Page 7: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.](https://reader030.fdocuments.us/reader030/viewer/2022032703/56649d265503460f949fcb29/html5/thumbnails/7.jpg)
Effects on ComputerEffects on Computer
• Create unwanted Create unwanted CPU activityCPU activitydisk usagedisk usagenetwork trafficnetwork traffic
• Difficulty in connecting to the InternetDifficulty in connecting to the Internet
![Page 8: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.](https://reader030.fdocuments.us/reader030/viewer/2022032703/56649d265503460f949fcb29/html5/thumbnails/8.jpg)
Examples of spywareExamples of spyware
•CoolWebSearchCoolWebSearchinstall through the install through the weaknessweakness in Internet in Internet
ExplorerExplorerDirect trafficDirect traffic to some advertisement site to some advertisement site
like coolwebsearch.comlike coolwebsearch.compop-up adspop-up adsrewrite search engine resultrewrite search engine result
![Page 9: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.](https://reader030.fdocuments.us/reader030/viewer/2022032703/56649d265503460f949fcb29/html5/thumbnails/9.jpg)
Examples of spywareExamples of spyware
• Internet OptimizerInternet OptimizerRedirectRedirect Internet Explorer error pages t Internet Explorer error pages t
o advertisingo advertisingCannot accessCannot access password-protected site password-protected site
ss
![Page 10: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.](https://reader030.fdocuments.us/reader030/viewer/2022032703/56649d265503460f949fcb29/html5/thumbnails/10.jpg)
Examples of spywareExamples of spyware
Examples of Programs distrubuted withExamples of Programs distrubuted with sspyware:pyware:•DivXDivX•FlastGet (free version)FlastGet (free version)•DAEMON ToolsDAEMON Tools•BearshareBearshare
and more…and more…
![Page 11: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.](https://reader030.fdocuments.us/reader030/viewer/2022032703/56649d265503460f949fcb29/html5/thumbnails/11.jpg)
LegalityLegality
• Not illegalNot illegal in any way in any way
• User may User may prefer not to useprefer not to use those products those products
• Places like Washington Places like Washington passed lawspassed laws, people , people other than the owner or operatorother than the owner or operator
illegal illegal toto install install softwaresoftware- altering Web-- altering Web-browser settings, disable computer-security browser settings, disable computer-security software software
![Page 12: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.](https://reader030.fdocuments.us/reader030/viewer/2022032703/56649d265503460f949fcb29/html5/thumbnails/12.jpg)
Prevention and RemediesPrevention and Remedies
A A number of techniquesnumber of techniques emerged to emerged toremoveremove spyware spywareblockblock spyware spywarereduce the chancereduce the chance of getting spyware of getting spyware
Simplest remediesSimplest remedies: : •back upback up user data user data•ReinstallReinstall the OS the OS
![Page 13: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.](https://reader030.fdocuments.us/reader030/viewer/2022032703/56649d265503460f949fcb29/html5/thumbnails/13.jpg)
Prevention and RemediesPrevention and Remedies
• Anti-spyware programsAnti-spyware programs• Work in two ways: Work in two ways:
1.1. Real-time protectionReal-time protection2.2. Detection and removalDetection and removal
• Examples: Lavasoft’s Ad-Aware SE, SpybotExamples: Lavasoft’s Ad-Aware SE, Spybot_Search & Destroy, spy sweeper and more_Search & Destroy, spy sweeper and more
Screenshot of Lavasoft’s Ad-Aware SE
![Page 14: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.](https://reader030.fdocuments.us/reader030/viewer/2022032703/56649d265503460f949fcb29/html5/thumbnails/14.jpg)
Prevention and RemediesPrevention and Remedies
• Virtual MachineVirtual Machineinhibit infectioninhibit infectionprovide separate environmentprovide separate environmentspyware enters the virtual environmentspyware enters the virtual environmenthost computer unaffectedhost computer unaffected
![Page 15: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.](https://reader030.fdocuments.us/reader030/viewer/2022032703/56649d265503460f949fcb29/html5/thumbnails/15.jpg)
Situation in Hong KongSituation in Hong Kong
71
71.5
72
72.5
73
73.5
74
Percentage%
Networks inCompanies infected
by spyware
Hong Kong
Other countries
![Page 16: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.](https://reader030.fdocuments.us/reader030/viewer/2022032703/56649d265503460f949fcb29/html5/thumbnails/16.jpg)
Situation in Hong KongSituation in Hong Kong
• Front-line staffFront-line stafflittle knowledgelittle knowledge on spyware on spyware
• A A serious problemserious problem to solve to solve
• Companies should Companies should focus on thisfocus on this
![Page 17: Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.](https://reader030.fdocuments.us/reader030/viewer/2022032703/56649d265503460f949fcb29/html5/thumbnails/17.jpg)
RememberRemember
Always use computers with Always use computers with awareness!!awareness!!
The EndThe End