Documente Academic
Documente Profesional
Documente Cultură
A.ADWARE
or advertising-supported software, is any software package that automatically renders
advertisements in order to generate revenue for its author. The advertisements may be in the user
interface of the software or on a screen presented to the user during the installation process.
Adware is the name given to programs that are designed to display advertisements on your
computer, redirect your search requests to advertising websites and collect marketing-type data
about you for example, the types of websites that you visit so that customised adverts can be
displayed.
C.WAYS TO AVOID
How to Avoid Spyware and Adware
A lot of unwelcome software ends up on your computer in part because of something you did or
did not do. Here's how to avoid unwanted spyware or adware:
Be selective about what you download to your computer. Make sure you really need a
program before downloading it. And if you've never heard of the software maker, read its
website carefully to learn more about the people behind the technology, as well as the
technology itself. Also, watch out for ActiveX, which is a common tool for installing spyware
without your knowledge or consent. You can turn off ActiveX via your browser preferences
and you can always turn it back on should a trusted site require it.
Read licensing agreements. It can seem daunting to read these agreements, but to play it safe,
don't just scroll to the bottom and click the "I accept" button when installing freeware.
Instead, read each agreement carefully and look for language pertaining to any information-
gathering activity, which could mean that youll get spyware or adware along with your
freebie.
Watch out for anti-spyware scams. The Web is rife with "anti-spyware" tools that do little or
nothing to prevent spyware. Some even make it worse. Purveyors of these tools often provide
free scans, which almost invariably identify hundreds of spyware programs on your computer.
They then immediately ask you to buy their bogus product.
Beware of clickable advertisements. Try to avoid programs--especially freeware--that flash
clickable ads. These ads should be a red flag. If you click the ads, it's possible someone is
watching how you respond to them.
A.ROOTKIT
A rootkit is a type of software designed to hide the fact that an operating system has been
compromised, sometimes by replacing vital executables. Rootkits allow viruses and malware to
hide in plain sight by disguising as necessary files that your antivirussoftware will overlook.
Rootkits themselves are not harmful; they are simply used to hide malware, bots and worms.
Rootkits get their name from the Unix term for the primary administrator account called root
and kits, which refer to the software pieces that implement the tool. To install a rootkit, an
attacker must first gain access to the root account by using an exploit or obtaining the password
by cracking it or social engineering. Rootkits were originally used in the early 1990s and
targeted UNIX operating systems. Today, rootkits are available for many other operating
systems, including Windows. Because rootkits are activated before your operating system even
boots up, they are very difficult to detect and therefore provide a powerful way for attackers to
access and use the targeted computer without the owners notice. Due to the way rootkits are
used and installed, they are notoriously difficult to remove. Rootkits today usually are not used
to gain elevated access, but instead are used to mask malware payloads more effectively.
C.WAYS TO AVOID
Rootkits sneak in under the radar of computer security, hook deep into the operating system, then add
malicious programs. They arrive via clicked-on links in e-mail, instant messages and websites.
Increasingly, organized criminals use rootkits to spread remote control ware (also called botware),
spyware, spamware and keystroke loggers. They were present in 14 percent of the 5.7 million
computers scanned by Windows Malicious Software Removal Tool, according to a June Microsoft
report.
Rootkits start as low-level programs, such as Web helper applications, that are too small for security
software to notice. Then they compile and open a back door to other programs that use the computer
to relay e-mail and IM spam, or steal personal and regulated information. "Rootkits demand a new
type of technology that finds and eliminates well-hidden malware.
A.BOT
An Internet bot, also known as web robot, WWW robot or simply bot, is a software
application that runs automated tasks (scripts) over the Internet Typically, bots perform tasks
that are both simple and structurally repetitive, at a much higher rate than would be possible for a
human alone. The largest use of bots is inweb spidiring (web crawler), in which an automated
script fetches, analyzes and files information from web servers at many times the speed of a
human. More than half of all web traffic is made up of bots.
C.WAYS TO AVOID
In order to ensure your site and business has the best protections available, its important to
choose a solution that does not rely on IP addresses alone; provides real-time detection and
mitigation (without adding even 10 milliseconds of latency); offers very high accuracy (at or
above 99 percent); and learns and improves, constantly.
So, when evaluating bot protection solutions, youll want to look for these items:
A.SPYWARE
Spyware is software that aims to gather information about a person or organization without their
knowledge, that may send such information to another entity without the consumer's consent, or
that asserts control over a device without the consumer's knowledge.[1]
"Spyware" is mostly classified into four types: adware, system monitors, tracking cookies,
and trojans;[2] examples of other notorious types include digital rights management capabilities
that "phone home", keyloggers, rootkits, and web beacons.
Spyware is mostly used for the purposes of tracking and storing Internet users' movements on the
Web and serving up pop-up ads to Internet users. Whenever spyware is used for malicious
purposes, its presence is typically hidden from the user and can be difficult to detect. Some
spyware, such as keyloggers, may be installed by the owner of a shared, corporate, or public
computer intentionally in
order to monitor users.
B.BEHAVIOR
-Screen Content Monitoring;
-Keystrokes Logging;
-Email Content Monitoring;
-Chat Content Monitoring;
-Social Network Content Monitoring;
-Website Passwords and User Names Monitoring;
-Documents & Files Content Monitoring;
-Print Content Monitoring.
C.HOW TO AVOID