Page 106 - StudyBook.pdf
P. 106

90     Chapter 2 • General Security Concepts: Attacks

                 It is important to compare spyware versus other malware. Spyware usually does
             not self-replicate, meaning that they need to be installed in each computer they
             infect. Some spyware are well-behaved and even legal, used to pay for a particular
             program’s use. Many spyware take the form of browser toolbars, and infected
             machines usually have more than one (sometimes up to a dozen) spyware installed.
             As they’re normally linked to browsing activity, they can flood the victim’s desktop
             with non-stop pop-up windows, many to pornographic sites.
                 Some of the most common spyware include Gator, BargainBuddy, Bonzi
             Buddy, 180 solutions, Internet Optimizer, and a whole lot more. Fortunately, there
             are a lot of spyware protection programs available.They include Microsoft Defender
             and the integrated anti-spyware functionality in Windows Vista, and classic pro-
             grams like Ad-Aware, Spyware Doctor, and many more.


















































          www.syngress.com
   101   102   103   104   105   106   107   108   109   110   111