You are invited to Log in or Register a free Frihost Account!

How Spyware Works!!!

How Spyware Works
Do read it...

Has your computer ever become so slow that you can fix yourself a snack in the time it takes your word processor to open? Spyware may be to blame.

Spyware has been known to masquerade as a prize-notification pop-up window.

Spyware is a category of computer programs that attach themselves to your operating system in nefarious ways. They can suck the life out of your computer's processing power. They are designed to track your Internet habits, nag you with unwanted sales offers or generate traffic for their host Web site. According to recent estimates, more than two-thirds of all personal computers are infected with some kind of spyware [ref]. But before you chuck your computer out the window and move to a desert island, you might want to read on. This HowStuffWorks article explains how spyware gets on your computer, what it does there and how to get rid of it.

What is Spyware?
Other "Ware"

# Malware - a general term for any program that makes changes (does malicious or "bad" things) without your express permission
# Adware - programs designed specifically to deliver unrequested advertising
# Stealware
# - specific spyware designed to capture clicks or Web-site referral credits Browser hijacker
- a malicious program that becomes deeply embedded in your browser's code and core functionality
Some people mistake spyware for a computer virus. A computer virus is a piece of code designed to replicate itself as many times as possible, spreading from one host computer to any other computers connected to it. It usually has a payload that may damage your personal files or even your operating system.

Spyware, on the other hand, is generally not designed to damage your computer. Spyware is broadly defined as any program that gets into your computer without permission and hides in the background while it makes unwanted changes to your user experience. The damage it does is more a by-product of its main mission, which is to serve you targeted advertisements or make your browser display certain sites or search results.

At present, most spyware targets only the Windows operating system. Some of the more notorious spyware companies include Gator, Bonzi Buddy, 180 Solutions, DirectRevenue, Cydoor, CoolWebSearch, Xupiter, XXXDial and Euniverse.

How Did it Get on Your Computer?
Spyware usually gets onto your machine because of something you do, like clicking a button on a pop-up window, installing a software package or agreeing to add functionality to your Web browser. These applications often use trickery to get you to install them, from fake system alert messages to buttons that say "cancel" when they really do the opposite.

Here are some of the general ways in which Spyware finds its way into your computer:

* Piggybacked software installation - Some applications -- particularly peer-to-peer file-sharing clients -- will install spyware as a part of their standard install. If you don't read the installation list closely, you might not notice that you're getting more than the file-sharing application you want. This is especially true of the "free" versions that are advertised as an alternative to software you have to buy. There's no such thing as a free lunch.

Courtesy Sharman Networks 2002-2004 - All Rights Reserved.
While it officially claims otherwise, Kazaa has been known to include spyware in its download package.

* Drive-by download - This is when a Web site or pop-up window automatically tries to download and install spyware on your machine. The only warning you might get would be your browser's standard message telling you the name of the software and asking if it's okay to install it.

Photo courtesy
Internet Explorer security warning

If your security settings are set low enough, you won't even get the warning.

* Browser add-ons - These are pieces of software that add enhancements to your Web browser, like a toolbar, animated pal or additional search box. Sometimes, these really do what they say they do but also include elements of spyware as part of the deal. Or sometimes they are nothing more than thinly veiled spyware themselves. Particularly nasty add-ons are considered browser hijackers -- these embed themselves deeply in your machine and take quite a bit of work to get rid of.

Photo courtesy
Bonzi Buddy is an "add-on" application that includes spyware in its package.

* Masquerading as anti-spyware - This is one of the cruelest tricks in the book. This type of software convinces you that it's a tool to detect and remove spyware.

When you run the tool, it tells you your computer is clean while it installs additional spyware of its own.

What Does it do When it Gets There?
Snitches and Sneaks
There are computer programs that truly "spy" on you. There are applications designed to silently sit on your desktop and intercept personal information like usernames and passwords. These programs include Bugdrop, Back Orifice and VX2. These are more like viruses or hacker tools than spyware.
Spyware can do any number of things once it is installed on your computer.

At a minimum, most spyware runs as an application in the background as soon as you start your computer up, hogging RAM and processor power. It can generate endless pop-up ads that make your Web browser so slow it becomes unusable. It can reset your browser's home page to display an ad every time you open it. Some spyware redirects your Web searches, controlling the results you see and making your search engine practically useless. It can also modify the DLLs (dynamically linked libraries) your computer uses to connect to the Internet, causing connectivity failures that are hard to diagnose.

Certain types of spyware can modify your Internet settings so that if you connect through dial-up service, your modem dials out to expensive, pay telephone numbers. Like a bad guest, some spyware changes your firewall settings, inviting in more unwanted pieces of software. There are even some forms that are smart enough to know when you try to remove them in the Windows registry and intercept your attempts to do so.

The point of all this from the spyware makers' perspective is not always clear. One reason it's used is to pad advertisers' Web traffic statistics. If they can force your computer to show you tons of pop-up ads and fake search results, they can claim credit for displaying that ad to you over and over again. And each time you click the ad by accident, they can count that as someone expressing interest in the advertised product.

Another use of spyware is to steal affiliate credits. Major shopping sites like and offer credit to a Web site that successfully directs traffic to their item pages. Certain spyware applications capture your requests to view sites like Amazon and Ebay and then take the credit for sending you there.

So is it legal to install difficult-to-remove software without the user's permission? Not really. There's an increasing body of state legislation that explicitly bans spyware, including the Spyware Control Act in Utah and the Consumer Protection Against Computer Spyware Act in California. But even without these new state laws, federal law already prohibits spyware. The Computer Fraud and Abuse Act covers any unauthorized software installations. Deceptive trade practices of any kind also violate the Federal Trade Commission Act. Additionally, the Electronic Communications Privacy Act makes it unlawful for companies to violate the security of customers' personal information.

Just like anti-spam legislation, these spyware laws can be very difficult to enforce in practice, and the perpetrators know it. It can be tough to find hard evidence connecting individual companies to their spyware products, and, as with all Internet-related lawsuits, there are often battles over which court's jurisdiction applies to the case. Just because it's illegal doesn't mean it's easy to stop.

Spyware Help

* Microsoft DLL Help Database - Download original DLLs
* SpywareGuide: List of Spyware - Find information on a specific piece of spyware
* SpywareInfo: Browser Hijacking: Hijack Removal - Find detailed instructions on removing a browser hijacker

How can you protect yourself against spyware, and what can you do if you think you already have some on your computer? Here are a few suggestions.

Use a spyware scanner.
There are several applications you can turn to for trustworthy spyware detection and removal, including Ad-aware, Spybot and Microsoft AntiSpyware, which is currently in beta. All three are free for the personal edition. These work just like your anti-virus software and can provide active protection as well as detection. They will also detect Internet cookies and tell you which sites they refer back to.

Note - Once you know which spyware is on your computer, in some cases you'll need to seek specific instructions on how to remove it. Links to some of those instructions are listed in the "Spyware Help" box to the right, and even more are included in the Lots More Information section at the end of this article.

Use a pop-up blocker.
Many of the current browsers, including Internet Explorer 6.0 and Mozilla Firefox 1.0, have the ability to block all Web sites from serving you pop-up windows. This function can be configured to be on all of the time or to alert you each time a site wants to pop up a new window. It can also tell you where the pop-up is coming from and selectively allow windows from trusted sources.

Disable Active-X.
Most browsers have security settings in their preferences which allow you to specify which actions Web sites are allowed to take on your machine. Since many spyware applications take advantage of a special code in Windows called Active-X, it's not a bad idea to simply disable Active-X on your browser. Note that if you do this, you will also disallow the legitimate uses for Active-X, which may interfere with the functionality of some Web sites.

Be suspicious of installing new software.
In general, it pays to be suspicious when a site asks to install something new on your computer. If it's not a plug-in you recognize, like Flash, QuickTime or the latest Java engine, the safest plan of action is to reject the installation of new components unless you have some specific reason to trust them. Today's Web sites are sophisticated enough that the vast majority of functionality happens inside your browser, requiring only a bare minimum of standard plug-ins. Besides, it never hurts to reject the installation first and see if you can get on without it. A trustworthy site will always give you the opportunity to go back and download a needed component later.

Use the "X" to close pop-up windows.
Get to know what your computer's system messages look like so that you can spot a fake. It's usually pretty easy to tell the difference once you get to know the standard look of your system alerts. Stay away from the "No thanks" buttons if you can help it, and instead close the window with the default "X" at the corner of the toolbar. For an even more reliable option, use the keystroke combination for "close window" built into your software. You can look in your browser's "File" menu to find it.

Please use quote tags and cite the source when posting copy-pasted material - ocalhoun
thank you I know
Thanks to share it here but it is copy and paste material from howstuffworks

original link is

so please quote copied material

and add some of your own views.
Thanks to share it here
Da Rossa
Removed backseat moderating/off topic instructions -ocalhoun
(If you're honestly trying to help the person, please send them a PM)

Da Rossa's Edit: sorry for it.
Spyware, and malware are a real menace not just to the user, or PC, but to organizations as well, and the people associated with the user.
One of the traits of malware and spyware, is that it sends user information to its home server, where the email of the sender is spoofed to send spam and malware mails to the recipients list of senders in addition to other list of senders as well.

The other trait is that it registers itself as a valid windows service, or dll file, or infects the windows system files, that cannot be detected or cleaned by some of the latest antiviruses.
I know about all of the information that has been quoted, but really need to be reminded about this as well, as I have this nasty habit of keeping my computer logged in for days on end. With Website pages open on it. I sometimes do it when I have not had time to read through them, and I'm in a hurry to get out. I would imagine while they are open and idling on my computer that the proprietors of those Websites can get up to all kinds of mischief? Awful that one has to take so many precautions?

I was also wondering whether when one clicks on videos where ads are running before you get to the actual video, whether those would contain some sort of malware or spyware to get information from my computer?
Related topics
Reply to topic    Frihost Forum Index -> Lifestyle and News -> Discuss World News

© 2005-2011 Frihost, forums powered by phpBB.