Understanding Adware, Spyware, Grayware, and Malware
Adware, Spyware, Grayware, and Malware is a software that often interfere with or severely disrupt computer users, because they install themselveswithout permission from the user.
here I will explain all of adware, spyware, grayware and malware.
1. Adware
Adware is advertising to be included in secret by the makers of the program. Generally the programs are free, but the user must receive compensation for ads on the program. Adware is actually functioning as a form of promotion or advertising banners. Sometimes users want to use a shareware program but in which there is a program that functioned as Adware. A program example is given for free, it has a small window on the program kept changing and changing the image ads.
Adware is another form of malware, and exactly as the name suggests, the software with the purpose of promotion or advertising. Adware is usually found in the freeware software that we download. Although some programs give you the option to not install adware extra, add a lot of free software adware therein without our knowledge.
2. Spyware
Spyware generally is a kind of programs that collect and transfer information about a person and habits browsingnya for the purposes of advertising / promotion. But lately spyware interchangeable used for another purpose, namely to steal data2-critical data that is in someone's computer, such as passwords, PIN number, address etc. Spyware is not a virus but a suspicious software (malicious software / malware) that can install itself into the computer, with the aim of stealing computer data such as email addresses and traffic statistics on the internet.
2. Spyware
Spyware generally is a kind of programs that collect and transfer information about a person and habits browsingnya for the purposes of advertising / promotion. But lately spyware interchangeable used for another purpose, namely to steal data2-critical data that is in someone's computer, such as passwords, PIN number, address etc. Spyware is not a virus but a suspicious software (malicious software / malware) that can install itself into the computer, with the aim of stealing computer data such as email addresses and traffic statistics on the internet.
Spyware is a type of program that attacks a computer with a computer spying. spyware and malware have in common is the ability to collect and distribute personal information without your permission. Spyware can also send and make computer resources and information available to the recipient is unknown or remote users without your knowledge or permission.
Spyware and malware is a possible method for identity theft since the owner's or user's computer does not know about or do not give their permission for the installation and use of hidden programs or files. There are different types of spyware that collects different information. Common type of spyware is a keylogger that records what information you type on your keyboard. So, why the credit card account numbers can be lost, or stolen logins and passwords, all of which are caused from Spyware.
Spyware deliberately created and disseminated by the manufacturer and disseminated on the internet so they can spy on all the activities of others on the internet, especially when they're done browsing. If the programs they have created (there is a spyware / adware) already embedded and active in a person's computer, then they will easily do things that in essence would harm Internet users.
Spyware is divided into three kinds, namely:
Spyware is divided into three kinds, namely:
• Adware
Generally the programs are free, but the user must receive compensation for ads on the program. Adware is another form of malware, and exactly as the name suggests, the software with the purpose of promotion or advertising. Adware is usually found in the freeware software that we download. Although some programs give you the option to not install adware extra, add a lot of free software adware therein without our knowledge.
• Browser Hijacker Hijacker & Search
Browser Hijacker: Your browser has entered a particular link and force you to go on a site even if you are correctly typing the address of the site you want. This means that your browser program indirectly been hijacked and redirected to specific site. Search Hijacker is a control carried out a search engine on the browser. If one writes the address, the program usually displays so many pop up ads that are not known.
Generally the programs are free, but the user must receive compensation for ads on the program. Adware is another form of malware, and exactly as the name suggests, the software with the purpose of promotion or advertising. Adware is usually found in the freeware software that we download. Although some programs give you the option to not install adware extra, add a lot of free software adware therein without our knowledge.
• Browser Hijacker Hijacker & Search
Browser Hijacker: Your browser has entered a particular link and force you to go on a site even if you are correctly typing the address of the site you want. This means that your browser program indirectly been hijacked and redirected to specific site. Search Hijacker is a control carried out a search engine on the browser. If one writes the address, the program usually displays so many pop up ads that are not known.
• Key loggers
Keylogger is a software that has the ability to monitor and record all the activity of keyboard keystrokes, including passwords. Then the keylogger will store the recording. Even more sophisticated, these recordings in the form of text files can be sent to specified email periodically through an Internet connection. And send data to the server Malware makers. The workings are hidden keylogger (hidden). Usually she will appear in the system if we do the keyboard combination (specific shortcut).
3. Grayware
Grayware operates in a way similar to malware, but does not spread to harm the users directly. This does not affect the functionality of such systems. Mostly, information on patterns of use both data collected to sell or to place advertisements systematically.
4. Malware
These malicious programs which have the characteristics to damage by infecting our computer systems. The effect is definitely cause harm to us, including: loss of data, loss of access to certain accounts which we have registered, until eventually cause material harm to us. Some of these threats can be classified as Malware, Adware and Spyware. Through the following review will discuss the difference of the third term through a variety of traits and the threat it causes.
Malware is software that aims to provide a problem on a computer by way restrict, modify and lay off the computer's performance. With a common goal for the download and installation hidden confusing. Malware found itself unusual because of internet downloads, email link and attachment, social networking, online games, chatrooms, etc. from dangerous websites.
Indications Malware, Some of the factors so that it can be concluded that the malware has been installed on our computer are:
• The browser home page keeps changing.
• Pop-up ads appear when the browser is closed.
• Appears strange icon on the desktop.
• Light flashes computer (the computer in the process of deciphering process information) at the time of unusual or unexpected. It is difficult to observe with broadband because there is no visual difference between the incoming and outgoing data.
• changing the browser settings, including early dafault current web browser is opened.
• File upload or download happens without user consent.
• The browser home page keeps changing.
• Pop-up ads appear when the browser is closed.
• Appears strange icon on the desktop.
• Light flashes computer (the computer in the process of deciphering process information) at the time of unusual or unexpected. It is difficult to observe with broadband because there is no visual difference between the incoming and outgoing data.
• changing the browser settings, including early dafault current web browser is opened.
• File upload or download happens without user consent.
General guidelines for avoiding Malware, Adware and Spyware
• Do not open emails or email attachments from unknown senders.
• Block or not click on pop-up window suspicious.
• Do not open the files associated with malware classified as such. Bat,. Com,. Exe,. Pif,. Txt.vbs,. Htm.exe or. Vbs
• Do not download and install applications from sources other than trusted.
• Avoid form of phishing scams.
• Use updated anti-virus and anti-spyware regularly. Spyware is software that is intended to mislead and secretly installed on computers over the web, once installed on the hard drive, then the spyware into land for outsiders to access confidential information.
• Do not open emails or email attachments from unknown senders.
• Block or not click on pop-up window suspicious.
• Do not open the files associated with malware classified as such. Bat,. Com,. Exe,. Pif,. Txt.vbs,. Htm.exe or. Vbs
• Do not download and install applications from sources other than trusted.
• Avoid form of phishing scams.
• Use updated anti-virus and anti-spyware regularly. Spyware is software that is intended to mislead and secretly installed on computers over the web, once installed on the hard drive, then the spyware into land for outsiders to access confidential information.
0 comments:
Post a Comment