Why do people spy on innocent computer users? What do they care about your personal computer habits? Spies seek information as to who you are, where you live, what you do on your computer, and what sites you frequent online. With the data they gather, they take it and sell it to third parties as a source of income. Worst of all, they do it in an underhanded, immoral, and often illegal manner while invading your privacy.
Spyware, also called malware, installs itself on your computer without you even knowing about it. With it, facts are accumulated about your personal computing habits and this information is being sold to advertising firms whom push unwanted ads at you. It all happens as these malicious programs record you keystrokes and send them to a third party. This is how thieves get your usernames and passwords.
Not only does spyware intrude on your personal privacy, it may wreak havoc with your computer. It can clog your system’s memory, consume space on your hard drive, and cause performance slowdowns. Spyware can even create an electronic “back door” enabling bad people to come into your system, take control of it, and use it for their own purpose. Your machine can be a vehicle to sending spam to others or launching attacks on other computers on the internet.
And if that isn’t enough, spyware can change settings and hijack your web browser causing an unwanted homepage to appear every time you get online. Some of these malicious programs can cleverly embed themselves so deeply into your system that you will need a great deal of computer expertise to remove them. This may necessitate bringing your computer to a “geek squad” for repairs.
How does spyware find its way into your computer? Through the following ways:
- It arrives in an automatic download form from a website you are surfing, known as “drive-by downloading.” Porn sites or the like can be a chief source of spyware.
- You can be tricked into clicking on a link that downloads spyware from a website.
- Pop-up windows telling you that you won a prize are a common example.
- Spyware can be embedded in the installation of a free or pirated piece of software you download. Peer-to-peer (P2P) sites that offer shared MP3 and video files such as Kazaa are more than likely to transmit spyware when installing them.
- Spyware can be found in email attachments from senders you don’t even know. Such attachments come in commercial email and are deemed as spam.
There are numerous types of programs that contain spyware and the sad part is, they are commonly downloaded online. Such programs are desktop toolbars; free games, puzzles, or other forms of entertainment; screensavers, pop-up blocker programs; and files from file-sharing sites.
Computer spying is practiced by companies as well as devious people. Individuals seek out information submit to businesses in exchange for money. Businesses either buy private data and/or use spyware themselves. By analyzing your personal computer using habits, they can solicit ads for products or services you are likely to buy. As you jump onto the Internet, you will encounter pop-up ad boxes. Such software that creates pop-up advertisements is call adware and is a part of spyware.
Adware is often bundled with free software. Publishers include it as a means of earning additional revenue. The presence of adware is often written in the End User License Agreement (EULA). The EULA typically is a long scrollable document one must read and accept the terms before the program can be installed. Hence, it is highly recommended that you at least skim over the EULA before clicking “NEXT.”
Yet, another form of spyware “hijacks” browsers. If this spyware is installed on your machine and you hop onto the Internet, rather than your favorite homepage coming up, you’ll see a rogue page instead. More than likely this page will be an affiliate link. Affiliate links lead to pages where those who posted them earn money each time they’re visited. Likewise, there will be other inviting links and if you click on one of them, you’ll land on yet another affiliated page. The settings in the spyware override the settings you made on your machine.
Browser hijacking is a legitimate way of making money, but is exploited by private individuals as well. Some have directed surfers to pages that closely resemble those posted by Yahoo or Google. The site “Cool Web Search” is a Russian based site that is a classic example. Its owners claim that they stop hijackers that post affiliated sites. Giving viewers a false sense of security, they’ve made themselves a name: CWS hijackers.
Worst of all, some spywares can embed themselves so deeply into your computer that you will need a high degree of computer expertise to remove them. Some may take total control of your computer and the next time you start it up, it will automatically get online to that affiliated page.
Therefore, it is important that you remove spyware from your computer with an antispyware program. If you are having extreme difficulty navigating on the Internet or even in your operating system, chances are, you have spyware. You may see annoying pop-up boxes that are hard to get rid of. At this point yhttp://www.blogger.com/img/blank.gifou’ll want to disconnect your computhttp://www.blogger.com/img/blank.gifer from you home network and the Internet before it has a chance to spread to other computers. Consult your administrator or bring your computer into a shop for repairs.
About the Author: Publishnprosper is an experienced computer user and publishes articles on various computer topics about protecting your computer and keeping it running efficiently. The site offers ways to save money on antivirus software. You can also find coupons for it on Kaspersky coupon codes and BitDefender.
No comments:
Post a Comment