D7dc75b5474321009db4b5b08b9a7150

Summary
Number:KB0000006Workflow:published
Knowledge Base:ITPublished:2014-09-09
Category:IT / Security  
Author:Wayne Webb  
Valid to:2100-01-01  
Short description:Dealing with Spyware and Viruses\n\t\t


Dealing with Spyware/Adware


Spyware is the generic term for computer software that gathers information about you and your Internet surfing habits for marketing purposes; Adware refers to programs which gather information about you for marketing purposes in order to target your computer with advertisements (often in the form of pop-up windows.) These programs are often difficult to uninstall through traditional un-installation programs and will interfere with the normal performance of your computer's software and/or networking protocol.


Viruses, worms, and Trojan horses


According to Webster's Collegiate Dictionary, a computer virus is "a computer program usually hidden within another seemingly innocuous program that produces copies of itself and inserts them into other programs or files, and that usually performs a malicious action (such as destroying data)". Computer viruses are never naturally occurring; they are always man-made. Once created and released, however, their spread is not directly under human control.


  • Macro viruses: A macro is a piece of code that can be embedded in a data file. A macro virus is thus a virus that exists as a macro attached to a data file. In most respects, macro viruses are like all other viruses. The main difference is that they are attached to data files (i.e., documents) rather than executable programs.

    Document-based viruses are, and will likely continue to be, more prevalent than any other type of virus.


  • Worms: Worms are very similar to viruses in that they are computer programs that replicate functional copies of themselves (usually to other computer systems via network connections) and often, but not always, contain some functionality that will interfere with the normal use of a computer or a program. Unlike viruses, however, worms exist as separate entities; they do not attach themselves to other files or programs. Because of their similarity to viruses, worms also are often referred to as viruses.

  • Trojan horses: A Trojan horse is a program that does something undocumented which the programmer intended, but that users would not accept if they knew about it. By some definitions, a virus is a particular case of a Trojan horse, namely, one which is able to spread to other programs (i.e., it turns them into Trojans too). According to others, a virus that does not do any deliberate damage (other than merely replicating) is not a Trojan. Finally, despite the definitions, many people use the term "Trojan" to refer only to a non-replicating malicious program.


Fortunately, there are many options for prevention and the safe removal of Spyware/Adware from your computer:


Preventing Spyware / Adware
Choose programs carefully. Often free or trial programs downloaded from the Internet contain spyware/adware to fund the creators of the programs. The most common Spyware/Adware programs are installed with peer-to-peer sharing software such as Kazaa, Bearshare, and Limewire. Reading the license agreement and "Read Me" files of these programs will often indicate the installation of additional programs. Protect yourself by knowing your options. Some programs will allow you to customize the installation, whereas others such as Kazaa's latest version cannot be installed without Spyware/Adware.


Protect yourself by knowing that there are other dangers for users of these programs; particularly for those who do not understand how the software is structured to operate or for those who are not careful to share only files they own legally.


Do not click on unfamiliar links in pop-up windows. Spyware/Adware creators will disguise links in their pop-up windows. The safest way to close a pop-up windows is to right-click on it in your taskbar and choose Close or select the active window and use Alt + F4 on your keyboard.


Removing SpyWare / Adware
Many Spyware/Adware removal programs are free to download and use. The Solution Center has found success with a free program called Spybot, as well as Microsoft's AntiSpyWare. OIT advises that novice users request technical assistance when installing and using these programs. See "Obtaining Technical Assistance" below. Should you choose to use Spybot without assistance, read the directions online which remind you to back up your registry first, and then update the Spybot definition files before scanning your hard drive.


Click for Variables

short_description
Dealing with Spyware and Viruses\n\t\t
roles
wiki
direct
false
rating
description
source
sys_updated_on
2014-12-19 15:56:04
disable_suggesting
false
sys_class_name
kb_knowledge
number
KB0000006
sys_id
d7dc75b5474321009db4b5b08b9a7150
use_count
1
sys_updated_by
johnoliver.mendoza
flagged
false
disable_commenting
false
sys_created_on
2014-09-09 23:50:40
valid_to
2100-01-01
retired
workflow_state
published
text
<p> </p>\n<p><span style="font-size: 18pt;"><strong>Dealing with Spyware/Adware</strong></span></p>\n<p>Spyware is the generic term for computer software that gathers information about you and your Internet surfing habits for marketing purposes; Adware refers to programs which gather information about you for marketing purposes in order to target your computer with advertisements (often in the form of pop-up windows.) These programs are often difficult to uninstall through traditional un-installation programs and will interfere with the normal performance of your computer's software and/or networking protocol.</p>\n<p><strong><span style="font-size: 12pt;">Viruses, worms, and Trojan horses</span></strong></p>\n<p>According to Webster's <em>Collegiate Dictionary</em>, a computer virus is "a computer program usually hidden within another seemingly innocuous program that produces copies of itself and inserts them into other programs or files, and that usually performs a malicious action (such as destroying data)". Computer viruses are never naturally occurring; they are always man-made. Once created and released, however, their spread is not directly under human control.</p>\n<ul><li>Macro viruses: A macro is a piece of code that can be embedded in a data file. A macro virus is thus a virus that exists as a macro attached to a data file. In most respects, macro viruses are like all other viruses. The main difference is that they are attached to data files (i.e., documents) rather than executable programs.\n<p>Document-based viruses are, and will likely continue to be, more prevalent than any other type of virus.</p>\n</li><li>Worms: Worms are very similar to viruses in that they are computer programs that replicate functional copies of themselves (usually to other computer systems via network connections) and often, but not always, contain some functionality that will interfere with the normal use of a computer or a program. Unlike viruses, however, worms exist as separate entities; they do not attach themselves to other files or programs. Because of their similarity to viruses, worms also are often referred to as viruses. <br /><br /></li><li>Trojan horses: A Trojan horse is a program that does something undocumented which the programmer intended, but that users would not accept if they knew about it. By some definitions, a virus is a particular case of a Trojan horse, namely, one which is able to spread to other programs (i.e., it turns them into Trojans too). According to others, a virus that does not do any deliberate damage (other than merely replicating) is not a Trojan. Finally, despite the definitions, many people use the term "Trojan" to refer only to a non-replicating malicious program.</li></ul>\n<p> </p>\n<p><span style="font-size: 10pt;">Fortunately, there are many options for prevention and the safe removal of Spyware/Adware from your computer:</span></p>\n<p><span style="font-size: 12pt;"><b>Preventing Spyware / Adware</b></span><br />Choose programs carefully. Often free or trial programs downloaded from the Internet contain spyware/adware to fund the creators of the programs. The most common Spyware/Adware programs are installed with peer-to-peer sharing software such as Kazaa, Bearshare, and Limewire. Reading the license agreement and "Read Me" files of these programs will often indicate the installation of additional programs. Protect yourself by knowing your options. Some programs will allow you to customize the installation, whereas others such as Kazaa's latest version cannot be installed without Spyware/Adware.</p>\n<p>Protect yourself by knowing that there are other dangers for users of these programs; particularly for those who do not understand how the software is structured to operate or for those who are not careful to share only files they own legally.</p>\n<p>Do not click on unfamiliar links in pop-up windows. Spyware/Adware creators will disguise links in their pop-up windows. The safest way to close a pop-up windows is to right-click on it in your taskbar and choose <b>Close</b> or select the active window and use <b>Alt + F4 </b>on your keyboard.</p>\n<p><span style="font-size: 12pt;"><b>Removing SpyWare / Adware</b></span><br />Many Spyware/Adware removal programs are free to download and use. The Solution Center has found success with a free program called Spybot, as well as Microsoft's AntiSpyWare. OIT advises that novice users request technical assistance when installing and using these programs. See "Obtaining Technical Assistance" below. Should you choose to use Spybot without assistance, read the directions online which remind you to back up your registry first, and then update the Spybot definition files before scanning your hard drive. </p>\n<p> </p>
sys_created_by
johnoliver.mendoza
display_attachments
false
image
sys_view_count
0
article_type
text
cmdb_ci
author
Wayne Webb
my_author
Wayne Webb
my_author_link
SysUser.46d14f04a9fe19810142e40c6b071512
can_read_user_criteria
sys_mod_count
2
active
true
cannot_read_user_criteria
published
2014-09-09
sys_domain_path
/
sys_tags
meta_description
kb_knowledge_base
IT
my_kb_knowledge_base
IT
my_kb_knowledge_base_link
KbKnowledgeBase.A7e8a78bff0221009b20ffffffffff17
meta
topic
General
category
kb_category
IT / Security
my_kb_category
IT / Security
my_kb_category_link
KbCategory.6bfb6552ff0131009b20ffffffffff66
my_sys_class_name_link
KbKnowledge.D7dc75b5474321009db4b5b08b9a7150