2
Most read
4
Most read
15
Most read
Spyware and AdwareSpyware and Adware
Presented By:Presented By:
D.NaveenaD.Naveena
11731A051311731A0513
ContentsContents

What is Spyware?What is Spyware?

What is Adware?What is Adware?

How does Spyware and Adware work?How does Spyware and Adware work?

How to detect if your computer hasHow to detect if your computer has
Spyware/Adware?Spyware/Adware?

What programs are there to help get rid ofWhat programs are there to help get rid of
them?them?

RecommendationsRecommendations
What is Spyware and Adware?What is Spyware and Adware?
Both areBoth are independent programsindependent programs
that can be automatically installedthat can be automatically installed
when you surf the internet orwhen you surf the internet or
when you install free software.when you install free software.
MostMost adwareadware isis spywarespyware in ain a
different sense than "advertising-different sense than "advertising-
supported software," for asupported software," for a
different reason: it displaysdifferent reason: it displays
advertisements related to what itadvertisements related to what it
finds from spying on you.finds from spying on you.
What is Spyware?What is Spyware?
Spyware - is computer software which is installed
surreptitiously on a personal computer; it takes partial
control over the user's computer, without the user's
informed consent.
Collect various types of personal information - such as
Internet surfing habits, visited sites, can also interfere
installing additional software and redirecting Web
browser activity.
Spyware is known to change computer settings, resulting
in slow connection speeds, loss of Internet or functionality
of other programs.
AdwareAdware is any software package which automatically plays,is any software package which automatically plays,
displays, or downloads advertisements to a computer after thedisplays, or downloads advertisements to a computer after the
software is installed on it or while the application is being used.software is installed on it or while the application is being used.
Comes in the form ofComes in the form of popupspopups and unexplainedand unexplained
advertising programsadvertising programs on your computer.on your computer.
Also aAlso a LEGAL programLEGAL program!!
Adware are created byAdware are created by advertising companiesadvertising companies..
What is Adware?What is Adware?
Advertising companiesAdvertising companies
hope to generate moneyhope to generate money
from customers whofrom customers who
receive thereceive the popupspopups oror
unexplained programsunexplained programs onon
their computers.their computers.
Well-known adwareWell-known adware
programs-programs-
123 Messenger123 Messenger
AOL Instant MessengerAOL Instant Messenger
DivXDivX
Micro AntivirusMicro Antivirus
RealPlayerRealPlayer
Routes of infectionRoutes of infection
Spyware and Adware programs have a tendency to hide asSpyware and Adware programs have a tendency to hide as cookiecookie
oror temporary internet filestemporary internet files..
Ways-Ways-
Malicious websitesMalicious websites install spyware on readers' computers.install spyware on readers' computers.
Another way of distributing spyware involves tricking users byAnother way of distributing spyware involves tricking users by
manipulating security featuresmanipulating security features designed to prevent unwanteddesigned to prevent unwanted
installations.installations.
In a few cases, aIn a few cases, a wormworm oror virusvirus has delivered ahas delivered a spyware payloadspyware payload..
Some attackers used the Spybot worm to install spyware that putSome attackers used the Spybot worm to install spyware that put
pornographic pop-ups on the infected system's screen. Bypornographic pop-ups on the infected system's screen. By
directing traffic to ads, the spyware-makers funds author ofdirecting traffic to ads, the spyware-makers funds author of
website, which profits them personally.website, which profits them personally.
How to detect that your computer has spyware orHow to detect that your computer has spyware or
adware…adware…
ContinuousContinuous popupspopups..
PersistentPersistent changechange in yourin your
homepagehomepage..
Slower computer processingSlower computer processing,,
takes the computer longer totakes the computer longer to
process or startup.process or startup.
Extreme symptoms of spyware or adware…Extreme symptoms of spyware or adware…
A spyware program is rarelyA spyware program is rarely
alone on a computer: an affectedalone on a computer: an affected
machine usually hasmachine usually has multiplemultiple
infectionsinfections..
Internet browserInternet browser does not start up.does not start up.
Parts of your computer youParts of your computer you
cannot access withoutcannot access without freezingfreezing..
Major core data isMajor core data is lostlost oror
changedchanged..
What programs are there to help get rid ofWhat programs are there to help get rid of
spyware/adwarespyware/adware??
Out of many programs out in the internet that wereOut of many programs out in the internet that were
created to detect spyware/adware, four programscreated to detect spyware/adware, four programs
were chosen for this presentation.. They are:were chosen for this presentation.. They are:
Spybot Search and DestroySpybot Search and Destroy
SpysweeperSpysweeper
Symantec AntiVirusSymantec AntiVirus
Ad-aware 6.0Ad-aware 6.0
Spybot Search and DestroySpybot Search and Destroy
Type: Spyware KillerType: Spyware Killer
Advantages:Advantages:

Has aHas a Recovery featureRecovery feature thatthat
allows you to restore any filesallows you to restore any files
you may be deleted infected withyou may be deleted infected with
spywarespyware

Has anHas an Immunity featureImmunity feature thatthat
protects you from already knownprotects you from already known
spywaresspywares
Disadvantages:Disadvantages:

Infrequent updates causeInfrequent updates cause
spywares to slip past scans andspywares to slip past scans and
immunityimmunity
Spy SweeperSpy Sweeper
Type: Spyware/ Adware (FreeType: Spyware/ Adware (Free
Version)Version)
Advantages:Advantages:

Has aHas a immunity shieldimmunity shield thatthat
blocks known spywares.blocks known spywares.
Disadvantages:Disadvantages:

Takes a while to scan.Takes a while to scan.

Unless you pay for the Spy-Unless you pay for the Spy-
Sweeper, it does not come withSweeper, it does not come with
definition updates.definition updates.
Comments:Comments:

Effective program, onlyEffective program, only
backdraw is the payment youbackdraw is the payment you
need to make yearly to keep theneed to make yearly to keep the
program updated.program updated.
Norton Symantec AntiVirusNorton Symantec AntiVirus
Type: Virus/ Spyware/ AdwareType: Virus/ Spyware/ Adware
Advantages:Advantages:
Can detectCan detect virusesviruses,, hackinghacking
programsprograms,, spyware programsspyware programs,,
adware programsadware programs, etc., etc.
Comes with a firewall.Comes with a firewall.
Disadvantages:Disadvantages:
Detects very fewDetects very few
adware/spyware programsadware/spyware programs
Very confusing to use.Very confusing to use.
Comments:Comments:
Norton Symantec still has waysNorton Symantec still has ways
to go in detectingto go in detecting
adware/spyware programsadware/spyware programs
Ad-aware 6.0Ad-aware 6.0
Type: AdwareType: Adware
Advantages:Advantages:
•
EasyEasy to use scanning.to use scanning.
•
Detailed logs of where theDetailed logs of where the
adware and spyware programsadware and spyware programs
areare hiddenhidden..
Disadvantages:Disadvantages:
•
Ad-aware was built forAd-aware was built for
adware, so its ability to catchadware, so its ability to catch
spyware is restrictedspyware is restricted
Comments:Comments:
•
Effective Program. A bit onEffective Program. A bit on
thethe costlycostly side but its wellside but its well
worth it.worth it.
RecommendationsRecommendations
Preventing spyware and adware from getting onto your computerPreventing spyware and adware from getting onto your computer
is your first step!is your first step!

Do notDo not downloaddownload unnecessary software from theunnecessary software from the
internet, especially free ones because they most likelyinternet, especially free ones because they most likely
have adware or spyware inside them.have adware or spyware inside them.

If a download screen appears, asking you to confirmIf a download screen appears, asking you to confirm
your download,your download, click noclick no if you are not trying to installif you are not trying to install
anything.anything.

Avoid clickingAvoid clicking advertised popupsadvertised popups especially ones thatespecially ones that
mention “free” stuff if possible.mention “free” stuff if possible.
Recommendations contd..Recommendations contd..
Technical RecommendationsTechnical Recommendations
Disable saving of temporary filesDisable saving of temporary files
ConstantlyConstantly delete old temporary filesdelete old temporary files andand
cookiescookies
Always constantlyAlways constantly scanscan youryour computercomputer forfor
adware and spyware and keep youradware and spyware and keep your
Adware/Spyware killer programs fully updatedAdware/Spyware killer programs fully updated
at all times.at all times.
ConclusionConclusion
Unfortunately, spyware and adware aren't
going away any time soon. But you can take
control by deciding what gets in, what stays
out, and what remains on your computer.
Spyware and  adware

More Related Content

PPT
Virus project
PPTX
Types of cyber attacks
PPTX
Network Security ppt
PPTX
Cyber security
PPTX
Cyber security
PPTX
Types of malware
PPT
Cyber security & Importance of Cyber Security
PPTX
Introduction to cyber security
Virus project
Types of cyber attacks
Network Security ppt
Cyber security
Cyber security
Types of malware
Cyber security & Importance of Cyber Security
Introduction to cyber security

What's hot (20)

PPTX
Cyber security
PPTX
Cyber security
PPTX
Computer security
PPTX
Cyber Crime and Security
PPTX
Cyber threats
PPTX
Introduction to Cyber Forensics Module 1
PPTX
Cyber security
PPTX
Password Cracking
PPT
Basic Security Chapter 1
PPTX
PPTX
Introduction to ethical hacking
PPTX
Cyber Crime
PPTX
Malware ppt
PPTX
Computer virus
PPTX
Introduction to Cyber Security
PPT
Proxy Servers & Firewalls
PPTX
Cyber security
PPTX
Computer Security 101
PPTX
Computer Malware and its types
PDF
Malware and security
Cyber security
Cyber security
Computer security
Cyber Crime and Security
Cyber threats
Introduction to Cyber Forensics Module 1
Cyber security
Password Cracking
Basic Security Chapter 1
Introduction to ethical hacking
Cyber Crime
Malware ppt
Computer virus
Introduction to Cyber Security
Proxy Servers & Firewalls
Cyber security
Computer Security 101
Computer Malware and its types
Malware and security
Ad

Viewers also liked (11)

PPT
spyware
PPT
Spyware
PPT
Lecture 4 firewalls
PPT
Phishing & Pharming
PDF
What Is Spyware?
PPTX
Biometric security using cryptography
PPT
PPT
PPT
Firewalls
spyware
Spyware
Lecture 4 firewalls
Phishing & Pharming
What Is Spyware?
Biometric security using cryptography
Firewalls
Ad

Similar to Spyware and adware (20)

PPT
Spyware Adware1
PPT
Spyware
PPTX
PPT
S P Y W A R E4 S I K
PPT
Anti-virus software and spyware
PPTX
Adware
PPTX
Trojan horse
PPT
How Computer Viruses Work
PPT
Spyware
PPTX
IT viruses
PPTX
List of Malwares
PPTX
Adware and Browser Hijacker - Symptoms and Prevention
PPTX
Antivirus
PDF
DEFINING A SPYWARE
PPTX
Mischievous Malware
PPTX
PPTX
Anti virus software
PPT
Topic 12 internet security
PPTX
Ch. 3 computer virus
PPTX
Spyware
Spyware Adware1
Spyware
S P Y W A R E4 S I K
Anti-virus software and spyware
Adware
Trojan horse
How Computer Viruses Work
Spyware
IT viruses
List of Malwares
Adware and Browser Hijacker - Symptoms and Prevention
Antivirus
DEFINING A SPYWARE
Mischievous Malware
Anti virus software
Topic 12 internet security
Ch. 3 computer virus
Spyware

Recently uploaded (20)

PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PPTX
CyberSecurity Mobile and Wireless Devices
PPTX
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
PDF
Abrasive, erosive and cavitation wear.pdf
PDF
Java Basics-Introduction and program control
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PPTX
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
PDF
Applications of Equal_Area_Criterion.pdf
PPTX
A Brief Introduction to IoT- Smart Objects: The "Things" in IoT
PPTX
Module 8- Technological and Communication Skills.pptx
PPTX
Measurement Uncertainty and Measurement System analysis
PPTX
Information Storage and Retrieval Techniques Unit III
PPTX
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
PDF
Implantable Drug Delivery System_NDDS_BPHARMACY__SEM VII_PCI .pdf
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
Exploratory_Data_Analysis_Fundamentals.pdf
CyberSecurity Mobile and Wireless Devices
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
Abrasive, erosive and cavitation wear.pdf
Java Basics-Introduction and program control
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
Applications of Equal_Area_Criterion.pdf
A Brief Introduction to IoT- Smart Objects: The "Things" in IoT
Module 8- Technological and Communication Skills.pptx
Measurement Uncertainty and Measurement System analysis
Information Storage and Retrieval Techniques Unit III
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
Implantable Drug Delivery System_NDDS_BPHARMACY__SEM VII_PCI .pdf
"Array and Linked List in Data Structures with Types, Operations, Implementat...
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
distributed database system" (DDBS) is often used to refer to both the distri...
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...

Spyware and adware

  • 1. Spyware and AdwareSpyware and Adware Presented By:Presented By: D.NaveenaD.Naveena 11731A051311731A0513
  • 2. ContentsContents  What is Spyware?What is Spyware?  What is Adware?What is Adware?  How does Spyware and Adware work?How does Spyware and Adware work?  How to detect if your computer hasHow to detect if your computer has Spyware/Adware?Spyware/Adware?  What programs are there to help get rid ofWhat programs are there to help get rid of them?them?  RecommendationsRecommendations
  • 3. What is Spyware and Adware?What is Spyware and Adware? Both areBoth are independent programsindependent programs that can be automatically installedthat can be automatically installed when you surf the internet orwhen you surf the internet or when you install free software.when you install free software. MostMost adwareadware isis spywarespyware in ain a different sense than "advertising-different sense than "advertising- supported software," for asupported software," for a different reason: it displaysdifferent reason: it displays advertisements related to what itadvertisements related to what it finds from spying on you.finds from spying on you.
  • 4. What is Spyware?What is Spyware? Spyware - is computer software which is installed surreptitiously on a personal computer; it takes partial control over the user's computer, without the user's informed consent. Collect various types of personal information - such as Internet surfing habits, visited sites, can also interfere installing additional software and redirecting Web browser activity. Spyware is known to change computer settings, resulting in slow connection speeds, loss of Internet or functionality of other programs.
  • 5. AdwareAdware is any software package which automatically plays,is any software package which automatically plays, displays, or downloads advertisements to a computer after thedisplays, or downloads advertisements to a computer after the software is installed on it or while the application is being used.software is installed on it or while the application is being used. Comes in the form ofComes in the form of popupspopups and unexplainedand unexplained advertising programsadvertising programs on your computer.on your computer. Also aAlso a LEGAL programLEGAL program!! Adware are created byAdware are created by advertising companiesadvertising companies.. What is Adware?What is Adware?
  • 6. Advertising companiesAdvertising companies hope to generate moneyhope to generate money from customers whofrom customers who receive thereceive the popupspopups oror unexplained programsunexplained programs onon their computers.their computers. Well-known adwareWell-known adware programs-programs- 123 Messenger123 Messenger AOL Instant MessengerAOL Instant Messenger DivXDivX Micro AntivirusMicro Antivirus RealPlayerRealPlayer
  • 7. Routes of infectionRoutes of infection Spyware and Adware programs have a tendency to hide asSpyware and Adware programs have a tendency to hide as cookiecookie oror temporary internet filestemporary internet files.. Ways-Ways- Malicious websitesMalicious websites install spyware on readers' computers.install spyware on readers' computers. Another way of distributing spyware involves tricking users byAnother way of distributing spyware involves tricking users by manipulating security featuresmanipulating security features designed to prevent unwanteddesigned to prevent unwanted installations.installations. In a few cases, aIn a few cases, a wormworm oror virusvirus has delivered ahas delivered a spyware payloadspyware payload.. Some attackers used the Spybot worm to install spyware that putSome attackers used the Spybot worm to install spyware that put pornographic pop-ups on the infected system's screen. Bypornographic pop-ups on the infected system's screen. By directing traffic to ads, the spyware-makers funds author ofdirecting traffic to ads, the spyware-makers funds author of website, which profits them personally.website, which profits them personally.
  • 8. How to detect that your computer has spyware orHow to detect that your computer has spyware or adware…adware… ContinuousContinuous popupspopups.. PersistentPersistent changechange in yourin your homepagehomepage.. Slower computer processingSlower computer processing,, takes the computer longer totakes the computer longer to process or startup.process or startup.
  • 9. Extreme symptoms of spyware or adware…Extreme symptoms of spyware or adware… A spyware program is rarelyA spyware program is rarely alone on a computer: an affectedalone on a computer: an affected machine usually hasmachine usually has multiplemultiple infectionsinfections.. Internet browserInternet browser does not start up.does not start up. Parts of your computer youParts of your computer you cannot access withoutcannot access without freezingfreezing.. Major core data isMajor core data is lostlost oror changedchanged..
  • 10. What programs are there to help get rid ofWhat programs are there to help get rid of spyware/adwarespyware/adware?? Out of many programs out in the internet that wereOut of many programs out in the internet that were created to detect spyware/adware, four programscreated to detect spyware/adware, four programs were chosen for this presentation.. They are:were chosen for this presentation.. They are: Spybot Search and DestroySpybot Search and Destroy SpysweeperSpysweeper Symantec AntiVirusSymantec AntiVirus Ad-aware 6.0Ad-aware 6.0
  • 11. Spybot Search and DestroySpybot Search and Destroy Type: Spyware KillerType: Spyware Killer Advantages:Advantages:  Has aHas a Recovery featureRecovery feature thatthat allows you to restore any filesallows you to restore any files you may be deleted infected withyou may be deleted infected with spywarespyware  Has anHas an Immunity featureImmunity feature thatthat protects you from already knownprotects you from already known spywaresspywares Disadvantages:Disadvantages:  Infrequent updates causeInfrequent updates cause spywares to slip past scans andspywares to slip past scans and immunityimmunity
  • 12. Spy SweeperSpy Sweeper Type: Spyware/ Adware (FreeType: Spyware/ Adware (Free Version)Version) Advantages:Advantages:  Has aHas a immunity shieldimmunity shield thatthat blocks known spywares.blocks known spywares. Disadvantages:Disadvantages:  Takes a while to scan.Takes a while to scan.  Unless you pay for the Spy-Unless you pay for the Spy- Sweeper, it does not come withSweeper, it does not come with definition updates.definition updates. Comments:Comments:  Effective program, onlyEffective program, only backdraw is the payment youbackdraw is the payment you need to make yearly to keep theneed to make yearly to keep the program updated.program updated.
  • 13. Norton Symantec AntiVirusNorton Symantec AntiVirus Type: Virus/ Spyware/ AdwareType: Virus/ Spyware/ Adware Advantages:Advantages: Can detectCan detect virusesviruses,, hackinghacking programsprograms,, spyware programsspyware programs,, adware programsadware programs, etc., etc. Comes with a firewall.Comes with a firewall. Disadvantages:Disadvantages: Detects very fewDetects very few adware/spyware programsadware/spyware programs Very confusing to use.Very confusing to use. Comments:Comments: Norton Symantec still has waysNorton Symantec still has ways to go in detectingto go in detecting adware/spyware programsadware/spyware programs
  • 14. Ad-aware 6.0Ad-aware 6.0 Type: AdwareType: Adware Advantages:Advantages: • EasyEasy to use scanning.to use scanning. • Detailed logs of where theDetailed logs of where the adware and spyware programsadware and spyware programs areare hiddenhidden.. Disadvantages:Disadvantages: • Ad-aware was built forAd-aware was built for adware, so its ability to catchadware, so its ability to catch spyware is restrictedspyware is restricted Comments:Comments: • Effective Program. A bit onEffective Program. A bit on thethe costlycostly side but its wellside but its well worth it.worth it.
  • 15. RecommendationsRecommendations Preventing spyware and adware from getting onto your computerPreventing spyware and adware from getting onto your computer is your first step!is your first step!  Do notDo not downloaddownload unnecessary software from theunnecessary software from the internet, especially free ones because they most likelyinternet, especially free ones because they most likely have adware or spyware inside them.have adware or spyware inside them.  If a download screen appears, asking you to confirmIf a download screen appears, asking you to confirm your download,your download, click noclick no if you are not trying to installif you are not trying to install anything.anything.  Avoid clickingAvoid clicking advertised popupsadvertised popups especially ones thatespecially ones that mention “free” stuff if possible.mention “free” stuff if possible.
  • 16. Recommendations contd..Recommendations contd.. Technical RecommendationsTechnical Recommendations Disable saving of temporary filesDisable saving of temporary files ConstantlyConstantly delete old temporary filesdelete old temporary files andand cookiescookies Always constantlyAlways constantly scanscan youryour computercomputer forfor adware and spyware and keep youradware and spyware and keep your Adware/Spyware killer programs fully updatedAdware/Spyware killer programs fully updated at all times.at all times.
  • 17. ConclusionConclusion Unfortunately, spyware and adware aren't going away any time soon. But you can take control by deciding what gets in, what stays out, and what remains on your computer.

Editor's Notes

  • #5: The first recorded use of the term spyware occurred on October 16, 1995 in a Usenet post that poked fun at Microsoft's business model Spyware at first denoted hardware meant for espionage purposes.