Grayware, Adware, Malware, Spyware
Presenting By
Radhika .B
 Grayware – Grayware encompasses spyware, adware, dialers, joke programs,
remote access tools, and any other unwelcome files and programs apart
from viruses that can harm the performance of computers on your network.
Grayware refers to applications or files that are not classified as viruses or
Trojan horse programs, but can still negatively affect the performance of the
computers on your network and introduce significant security risks to your
organization.
 Adware - software that displays advertising banners, re-directs you to
websites, and otherwise conducts advertising on your computer (not to be
confused with popup ads, which come from the websites that you visit).
 Malware - malicious software that is intended to do harm to your computer
or software, including viruses, Trojans, and worms.
 Spyware - software that gathers information about you, your browsing and
Internet usage habits, as well as other data.
 Grayware can get onto your computer several ways
 If you install a peer-to-peer file-sharing system, Grayware is often “bundled”
in the install process. This is also common with other downloads/installs.
 Be suspicious of programs “enhancing” your computer. These could be tricky
ways to get you to install Grayware onto your computer. Examples are
“smileys” for your email, new mouse cursors, screen savers, theme,
transformation pack, etc.
 If your PC is not properly protected, it is possible for Grayware and other
unwanted files to be installed onto your computer without your knowledge.
 The existence of spyware and other types of Grayware on the
network have the potential to introduce the following:
◦ Reduced computer performance
◦ Increased Web browser-related crashes:
◦ Reduced user efficiency
◦ Degradation of network bandwidth
◦ Loss of personal and corporate information
◦ Higher risk of legal liability
 Update your PC security!
◦ Grayware authors know and attempt to exploit security “holes” in software.
Be sure to keep all of your software up to date, especially your operating
system, firewall, & anti-virus.
◦ Browse wisely. You can change your internet browser settings (Internet
Explorer, Firefox) with a few clicks. A good article for this information is:
Short URL http://goo.gl/HdDfkk
 Download programs ONLY from sites you trust.
 Use Grayware detection programs, such as firewalls, anti-virus
protection, and adware/malware scanners.
 Read the fine print! Many programs, security warnings, and privacy
statements contain critical information, including what you are
installing.
Protect your pc
 Unfortunately, Ad-aware can't isn’t a sure fix. “Net snoops” might
also track your surfing habits through Web bugs, clear images that
send back your ISP address, telling others that you are viewing their
page or content. Not all Web bugs are bad. Some companies use
clear image files to count how many readers visit a particular page.
Guard-IE is one particular product that alerts you to the presence of
Web bugs on a site, then lets you block them if you choose. Guard-IE
also removes Web referrers, tags that tell Web sites the last site you
visited. Finally, Guard-IE removes your Internet cookies, browser
history, and any temp files created on your hard drive. a good way to
keep your surfing habits from prying eyes.
 As good a privacy tool as Guard-IE is, only Internet Explorer users
will benefit. For a good, all-around, ad-blocking and privacy-
enhancing product for both Netscape and Internet Explorer, a good
tool is AdSubtract Pro 2.5.
 Source: C|NET
 Someone could be reading your e-mail. Consider this: Your e-mail
program probably sends your mail as an alphanumeric text file. That
means that anyone, whether at your company or at your Internet
service provider, could intercept, open, and read your mail with a text
editor such as Windows Notepad. Sharing banana-bread recipes
online? You probably don't have much to worry about. But if you
discuss business deals via e-mail, you'll need extra protection.
 A few products can encrypt the contents of your mail. If you're
looking for a free program to do encrypted e-mail, the selection is
limited, if you want to integrate with Outlook. Thunderbird +
Enigmail + GnuPG or GPG4Win does integrate with Outlook 2003
 Article
http://docs.trendmicro.com/all/ent/officescan/v10.0/en-
us/osce_10.0_olhcl/osce_topics/spyware_grayware.htm
 Short URL
http://goo.gl/HdDfkk

More Related Content

PPT
Spyware
PPT
S P Y W A R E4 S I K
PPT
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
PPT
Aiman
PPT
Dark Alleys/Internet Security
PPT
P R I V A C Y!!!
PPT
Spyware Adware1
PPTX
Protect your website
Spyware
S P Y W A R E4 S I K
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Aiman
Dark Alleys/Internet Security
P R I V A C Y!!!
Spyware Adware1
Protect your website

What's hot (18)

PPTX
Cyber security
PPT
Internet Security
PPT
Dark Alleys Part1
PPT
Dark Alleys Part1740
PPT
spyware
PDF
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
PPTX
Virus encryption
PDF
10 ways to_increase_your_computer_security
PDF
WordPress Troubleshooting Hacks.pdf
PPT
Viruses Spyware and Spam, Oh My!
PPT
Computer Malware
PPT
Introduction to Malware
PPT
Computer And Internet Security
PPTX
List of Malwares
PDF
Prevent browser hijack infection
PPTX
Web security by khubaib
PDF
WORDPRESS SECURITY: HOW TO AVOID BEING HACKED
PPT
Spyware
Cyber security
Internet Security
Dark Alleys Part1
Dark Alleys Part1740
spyware
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
Virus encryption
10 ways to_increase_your_computer_security
WordPress Troubleshooting Hacks.pdf
Viruses Spyware and Spam, Oh My!
Computer Malware
Introduction to Malware
Computer And Internet Security
List of Malwares
Prevent browser hijack infection
Web security by khubaib
WORDPRESS SECURITY: HOW TO AVOID BEING HACKED
Spyware
Ad

Viewers also liked (17)

PDF
Come accogliere gli ospiti con un'immagine efficace
DOCX
11489149340
PPT
Amish furniture prices amish showroom
PDF
An Empirical Study on Customer Relationship Management in Banking Sector in S...
PPTX
Strivve Engr245 2017
PDF
7.14.1 Выбор устройств плавного пуска Altistart и преобразователей чатсоты Al...
PDF
Selected_Architectural_Designs_2016
PPT
NJ Future Redevelopment Forum 2017 Lee
PDF
Engaging the distracted customer
PDF
[Infographic] How will Internet of Things (IoT) change the world as we know it?
PDF
How to Become a Thought Leader in Your Niche
PPT
나라사랑 국가 상징물
PDF
공공_빅데이터_분석의_확산을_위한_첫걸음-2016-12
PPTX
How to Protect your PC from Malware
PPTX
Optativa
PDF
Denis Vincent Quebec - the Helicopter Pilot
PPS
PHOTOS NOIR et BLANC eten COULEURS
Come accogliere gli ospiti con un'immagine efficace
11489149340
Amish furniture prices amish showroom
An Empirical Study on Customer Relationship Management in Banking Sector in S...
Strivve Engr245 2017
7.14.1 Выбор устройств плавного пуска Altistart и преобразователей чатсоты Al...
Selected_Architectural_Designs_2016
NJ Future Redevelopment Forum 2017 Lee
Engaging the distracted customer
[Infographic] How will Internet of Things (IoT) change the world as we know it?
How to Become a Thought Leader in Your Niche
나라사랑 국가 상징물
공공_빅데이터_분석의_확산을_위한_첫걸음-2016-12
How to Protect your PC from Malware
Optativa
Denis Vincent Quebec - the Helicopter Pilot
PHOTOS NOIR et BLANC eten COULEURS
Ad

Similar to Protect your pc (20)

PDF
What is malware
PPTX
Internet security
PPTX
Computer security threats & prevention
DOC
Web design premium
PPTX
How To Protect Your Home PC
PPTX
Spywareguide1
PDF
Spywareguide1
PDF
Spywareguide1
PDF
Top 5 antivirus tools
PPT
Understanding security and safe computing
PPTX
How to protect your computer from viruses.
PPSX
IT Security Seminar Cougar CPS
PDF
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
PPT
Computers.ppt
PPTX
How to remove pro search.me
PDF
10 steps to protecting your computer to the world of internet.
PPTX
Staying Safe on the Computer and Online
PDF
security By ZAK
PPS
Internet
PDF
Viruses and antiviruses
What is malware
Internet security
Computer security threats & prevention
Web design premium
How To Protect Your Home PC
Spywareguide1
Spywareguide1
Spywareguide1
Top 5 antivirus tools
Understanding security and safe computing
How to protect your computer from viruses.
IT Security Seminar Cougar CPS
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Computers.ppt
How to remove pro search.me
10 steps to protecting your computer to the world of internet.
Staying Safe on the Computer and Online
security By ZAK
Internet
Viruses and antiviruses

Recently uploaded (20)

PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PPTX
TEXTILE technology diploma scope and career opportunities
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Five Habits of High-Impact Board Members
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
CloudStack 4.21: First Look Webinar slides
Developing a website for English-speaking practice to English as a foreign la...
A proposed approach for plagiarism detection in Myanmar Unicode text
TEXTILE technology diploma scope and career opportunities
Chapter 5: Probability Theory and Statistics
Five Habits of High-Impact Board Members
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Module 1.ppt Iot fundamentals and Architecture
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
OpenACC and Open Hackathons Monthly Highlights July 2025
The influence of sentiment analysis in enhancing early warning system model f...
Convolutional neural network based encoder-decoder for efficient real-time ob...
NewMind AI Weekly Chronicles – August ’25 Week III
Build Your First AI Agent with UiPath.pptx
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Flame analysis and combustion estimation using large language and vision assi...
A contest of sentiment analysis: k-nearest neighbor versus neural network

Protect your pc

  • 1. Grayware, Adware, Malware, Spyware Presenting By Radhika .B
  • 2.  Grayware – Grayware encompasses spyware, adware, dialers, joke programs, remote access tools, and any other unwelcome files and programs apart from viruses that can harm the performance of computers on your network. Grayware refers to applications or files that are not classified as viruses or Trojan horse programs, but can still negatively affect the performance of the computers on your network and introduce significant security risks to your organization.  Adware - software that displays advertising banners, re-directs you to websites, and otherwise conducts advertising on your computer (not to be confused with popup ads, which come from the websites that you visit).  Malware - malicious software that is intended to do harm to your computer or software, including viruses, Trojans, and worms.  Spyware - software that gathers information about you, your browsing and Internet usage habits, as well as other data.
  • 3.  Grayware can get onto your computer several ways  If you install a peer-to-peer file-sharing system, Grayware is often “bundled” in the install process. This is also common with other downloads/installs.  Be suspicious of programs “enhancing” your computer. These could be tricky ways to get you to install Grayware onto your computer. Examples are “smileys” for your email, new mouse cursors, screen savers, theme, transformation pack, etc.  If your PC is not properly protected, it is possible for Grayware and other unwanted files to be installed onto your computer without your knowledge.
  • 4.  The existence of spyware and other types of Grayware on the network have the potential to introduce the following: ◦ Reduced computer performance ◦ Increased Web browser-related crashes: ◦ Reduced user efficiency ◦ Degradation of network bandwidth ◦ Loss of personal and corporate information ◦ Higher risk of legal liability
  • 5.  Update your PC security! ◦ Grayware authors know and attempt to exploit security “holes” in software. Be sure to keep all of your software up to date, especially your operating system, firewall, & anti-virus. ◦ Browse wisely. You can change your internet browser settings (Internet Explorer, Firefox) with a few clicks. A good article for this information is: Short URL http://goo.gl/HdDfkk  Download programs ONLY from sites you trust.  Use Grayware detection programs, such as firewalls, anti-virus protection, and adware/malware scanners.  Read the fine print! Many programs, security warnings, and privacy statements contain critical information, including what you are installing.
  • 7.  Unfortunately, Ad-aware can't isn’t a sure fix. “Net snoops” might also track your surfing habits through Web bugs, clear images that send back your ISP address, telling others that you are viewing their page or content. Not all Web bugs are bad. Some companies use clear image files to count how many readers visit a particular page. Guard-IE is one particular product that alerts you to the presence of Web bugs on a site, then lets you block them if you choose. Guard-IE also removes Web referrers, tags that tell Web sites the last site you visited. Finally, Guard-IE removes your Internet cookies, browser history, and any temp files created on your hard drive. a good way to keep your surfing habits from prying eyes.  As good a privacy tool as Guard-IE is, only Internet Explorer users will benefit. For a good, all-around, ad-blocking and privacy- enhancing product for both Netscape and Internet Explorer, a good tool is AdSubtract Pro 2.5.  Source: C|NET
  • 8.  Someone could be reading your e-mail. Consider this: Your e-mail program probably sends your mail as an alphanumeric text file. That means that anyone, whether at your company or at your Internet service provider, could intercept, open, and read your mail with a text editor such as Windows Notepad. Sharing banana-bread recipes online? You probably don't have much to worry about. But if you discuss business deals via e-mail, you'll need extra protection.  A few products can encrypt the contents of your mail. If you're looking for a free program to do encrypted e-mail, the selection is limited, if you want to integrate with Outlook. Thunderbird + Enigmail + GnuPG or GPG4Win does integrate with Outlook 2003