D7dc75b5474321009db4b5b08b9a7150
Summary | |||
---|---|---|---|
Number: | KB0000006 | Workflow: | published |
Knowledge Base: | IT | Published: | 2014-09-09 |
Category: | IT / Security | ||
Author: | Wayne Webb | ||
Valid to: | 2100-01-01 | ||
Short description: | Dealing with Spyware and Viruses\n\t\t |
Dealing with Spyware/Adware
Spyware is the generic term for computer software that gathers information about you and your Internet surfing habits for marketing purposes; Adware refers to programs which gather information about you for marketing purposes in order to target your computer with advertisements (often in the form of pop-up windows.) These programs are often difficult to uninstall through traditional un-installation programs and will interfere with the normal performance of your computer's software and/or networking protocol.
Viruses, worms, and Trojan horses
According to Webster's Collegiate Dictionary, a computer virus is "a computer program usually hidden within another seemingly innocuous program that produces copies of itself and inserts them into other programs or files, and that usually performs a malicious action (such as destroying data)". Computer viruses are never naturally occurring; they are always man-made. Once created and released, however, their spread is not directly under human control.
- Macro viruses: A macro is a piece of code that can be embedded in a data file. A macro virus is thus a virus that exists as a macro attached to a data file. In most respects, macro viruses are like all other viruses. The main difference is that they are attached to data files (i.e., documents) rather than executable programs.
Document-based viruses are, and will likely continue to be, more prevalent than any other type of virus.
- Worms: Worms are very similar to viruses in that they are computer programs that replicate functional copies of themselves (usually to other computer systems via network connections) and often, but not always, contain some functionality that will interfere with the normal use of a computer or a program. Unlike viruses, however, worms exist as separate entities; they do not attach themselves to other files or programs. Because of their similarity to viruses, worms also are often referred to as viruses.
- Trojan horses: A Trojan horse is a program that does something undocumented which the programmer intended, but that users would not accept if they knew about it. By some definitions, a virus is a particular case of a Trojan horse, namely, one which is able to spread to other programs (i.e., it turns them into Trojans too). According to others, a virus that does not do any deliberate damage (other than merely replicating) is not a Trojan. Finally, despite the definitions, many people use the term "Trojan" to refer only to a non-replicating malicious program.
Fortunately, there are many options for prevention and the safe removal of Spyware/Adware from your computer:
Preventing Spyware / Adware
Choose programs carefully. Often free or trial programs downloaded from the Internet contain spyware/adware to fund the creators of the programs. The most common Spyware/Adware programs are installed with peer-to-peer sharing software such as Kazaa, Bearshare, and Limewire. Reading the license agreement and "Read Me" files of these programs will often indicate the installation of additional programs. Protect yourself by knowing your options. Some programs will allow you to customize the installation, whereas others such as Kazaa's latest version cannot be installed without Spyware/Adware.
Protect yourself by knowing that there are other dangers for users of these programs; particularly for those who do not understand how the software is structured to operate or for those who are not careful to share only files they own legally.
Do not click on unfamiliar links in pop-up windows. Spyware/Adware creators will disguise links in their pop-up windows. The safest way to close a pop-up windows is to right-click on it in your taskbar and choose Close or select the active window and use Alt + F4 on your keyboard.
Removing SpyWare / Adware
Many Spyware/Adware removal programs are free to download and use. The Solution Center has found success with a free program called Spybot, as well as Microsoft's AntiSpyWare. OIT advises that novice users request technical assistance when installing and using these programs. See "Obtaining Technical Assistance" below. Should you choose to use Spybot without assistance, read the directions online which remind you to back up your registry first, and then update the Spybot definition files before scanning your hard drive.
- short_description
- Dealing with Spyware and Viruses\n\t\t
- roles
- wiki
- direct
- false
- rating
- description
- source
- sys_updated_on
- 2014-12-19 15:56:04
- disable_suggesting
- false
- sys_class_name
- kb_knowledge
- number
- KB0000006
- sys_id
- d7dc75b5474321009db4b5b08b9a7150
- use_count
- 1
- sys_updated_by
- johnoliver.mendoza
- flagged
- false
- disable_commenting
- false
- sys_created_on
- 2014-09-09 23:50:40
- valid_to
- 2100-01-01
- retired
- workflow_state
- published
- text
- <p> </p>\n<p><span style="font-size: 18pt;"><strong>Dealing with Spyware/Adware</strong></span></p>\n<p>Spyware is the generic term for computer software that gathers information about you and your Internet surfing habits for marketing purposes; Adware refers to programs which gather information about you for marketing purposes in order to target your computer with advertisements (often in the form of pop-up windows.) These programs are often difficult to uninstall through traditional un-installation programs and will interfere with the normal performance of your computer's software and/or networking protocol.</p>\n<p><strong><span style="font-size: 12pt;">Viruses, worms, and Trojan horses</span></strong></p>\n<p>According to Webster's <em>Collegiate Dictionary</em>, a computer virus is "a computer program usually hidden within another seemingly innocuous program that produces copies of itself and inserts them into other programs or files, and that usually performs a malicious action (such as destroying data)". Computer viruses are never naturally occurring; they are always man-made. Once created and released, however, their spread is not directly under human control.</p>\n<ul><li>Macro viruses: A macro is a piece of code that can be embedded in a data file. A macro virus is thus a virus that exists as a macro attached to a data file. In most respects, macro viruses are like all other viruses. The main difference is that they are attached to data files (i.e., documents) rather than executable programs.\n<p>Document-based viruses are, and will likely continue to be, more prevalent than any other type of virus.</p>\n</li><li>Worms: Worms are very similar to viruses in that they are computer programs that replicate functional copies of themselves (usually to other computer systems via network connections) and often, but not always, contain some functionality that will interfere with the normal use of a computer or a program. Unlike viruses, however, worms exist as separate entities; they do not attach themselves to other files or programs. Because of their similarity to viruses, worms also are often referred to as viruses. <br /><br /></li><li>Trojan horses: A Trojan horse is a program that does something undocumented which the programmer intended, but that users would not accept if they knew about it. By some definitions, a virus is a particular case of a Trojan horse, namely, one which is able to spread to other programs (i.e., it turns them into Trojans too). According to others, a virus that does not do any deliberate damage (other than merely replicating) is not a Trojan. Finally, despite the definitions, many people use the term "Trojan" to refer only to a non-replicating malicious program.</li></ul>\n<p> </p>\n<p><span style="font-size: 10pt;">Fortunately, there are many options for prevention and the safe removal of Spyware/Adware from your computer:</span></p>\n<p><span style="font-size: 12pt;"><b>Preventing Spyware / Adware</b></span><br />Choose programs carefully. Often free or trial programs downloaded from the Internet contain spyware/adware to fund the creators of the programs. The most common Spyware/Adware programs are installed with peer-to-peer sharing software such as Kazaa, Bearshare, and Limewire. Reading the license agreement and "Read Me" files of these programs will often indicate the installation of additional programs. Protect yourself by knowing your options. Some programs will allow you to customize the installation, whereas others such as Kazaa's latest version cannot be installed without Spyware/Adware.</p>\n<p>Protect yourself by knowing that there are other dangers for users of these programs; particularly for those who do not understand how the software is structured to operate or for those who are not careful to share only files they own legally.</p>\n<p>Do not click on unfamiliar links in pop-up windows. Spyware/Adware creators will disguise links in their pop-up windows. The safest way to close a pop-up windows is to right-click on it in your taskbar and choose <b>Close</b> or select the active window and use <b>Alt + F4 </b>on your keyboard.</p>\n<p><span style="font-size: 12pt;"><b>Removing SpyWare / Adware</b></span><br />Many Spyware/Adware removal programs are free to download and use. The Solution Center has found success with a free program called Spybot, as well as Microsoft's AntiSpyWare. OIT advises that novice users request technical assistance when installing and using these programs. See "Obtaining Technical Assistance" below. Should you choose to use Spybot without assistance, read the directions online which remind you to back up your registry first, and then update the Spybot definition files before scanning your hard drive. </p>\n<p> </p>
- sys_created_by
- johnoliver.mendoza
- display_attachments
- false
- image
- sys_view_count
- 0
- article_type
- text
- cmdb_ci
- author
- Wayne Webb
- my_author
- Wayne Webb
- my_author_link
- SysUser.46d14f04a9fe19810142e40c6b071512
- can_read_user_criteria
- sys_mod_count
- 2
- active
- true
- cannot_read_user_criteria
- published
- 2014-09-09
- sys_domain_path
- /
- sys_tags
- meta_description
- kb_knowledge_base
- IT
- my_kb_knowledge_base
- IT
- my_kb_knowledge_base_link
- KbKnowledgeBase.A7e8a78bff0221009b20ffffffffff17
- meta
- topic
- General
- category
- kb_category
- IT / Security
- my_kb_category
- IT / Security
- my_kb_category_link
- KbCategory.6bfb6552ff0131009b20ffffffffff66
- my_sys_class_name_link
- KbKnowledge.D7dc75b5474321009db4b5b08b9a7150