Page 106 - StudyBook.pdf
P. 106
90 Chapter 2 • General Security Concepts: Attacks
It is important to compare spyware versus other malware. Spyware usually does
not self-replicate, meaning that they need to be installed in each computer they
infect. Some spyware are well-behaved and even legal, used to pay for a particular
program’s use. Many spyware take the form of browser toolbars, and infected
machines usually have more than one (sometimes up to a dozen) spyware installed.
As they’re normally linked to browsing activity, they can flood the victim’s desktop
with non-stop pop-up windows, many to pornographic sites.
Some of the most common spyware include Gator, BargainBuddy, Bonzi
Buddy, 180 solutions, Internet Optimizer, and a whole lot more. Fortunately, there
are a lot of spyware protection programs available.They include Microsoft Defender
and the integrated anti-spyware functionality in Windows Vista, and classic pro-
grams like Ad-Aware, Spyware Doctor, and many more.
www.syngress.com