Spyware needs to go

Rapoza, Jim
December 2003
eWeek;12/1/2003, Vol. 20 Issue 48, p53
This article presents information on spyware, computer programs that hide inside installed applications and then use information on browsing habits to drive pop-up advertisements and other annoyances onto the system. Spyware has grown in popularity because it allows vendors of "free" utilities and browser plug-ins to gain revenues by permitting spyware to install when its products do. While programs like AdAware and its competitors do a good job finding and removing these programs, they aren't widely deployed. But there is a class of products that are specifically designed to find these kinds of uninvited programs and to do so in enterprise and managed environments, namely, anti-virus applications.


Related Articles

  • VirusScan Enterprise 8.0. Weil, Steven // Information Security;Oct2004, Vol. 7 Issue 10, p63 

    Evaluates the VirusScan Enterprise 8.0 antivirus application software from McAfee.

  • Anti-malware protection.  // MacUser;Jun2014, Vol. 30 Issue 6, p32 

    The article takes a look at the apps from reputable companies that offer to protect from various kinds of malicious activity including viruses that might appear without warning. It cites the Flashback and Mac Defender as examples of a software that openly asks users to install it instead of...

  • LEADERBOARD.  // InfoWorld;3/21/2005, Vol. 27 Issue 12, p50 

    Reviews several computer security software available in the U.S. market in March 2005, including Brightmail Anti-Spam 6.0 from Symantec.

  • Hailstorm v2.6. Mehta, Phoram // Information Security;Dec2005, Vol. 8 Issue 12, p64 

    The article evaluates the Hailstorm version 2.6 security application software from Cenzic and offers information on features, capabilities, specifications and cost.

  • C++ - Security = 0. Damore, Kelley // Information Security;Mar2006, Vol. 9 Issue 3, p8 

    Emphasizes the importance of security development in creating an application software for an organization. Setbacks to implementing secure coding in an organization; Factors that lead to the trend of embracing secure coding; Actions that need to be taken if secure coding is to be universally...

  • Prehistoric Patching 'Back in Spades.'. Mimoso, Michael S. // Information Security;Jan2006, Vol. 9 Issue 1, p17 

    The article offers advice for security managers on how cope with the lack automated patching in computer software used in data protection. Security managers should establish relationship with their application inventory. Users should demand software vendors of their responsibility to improve...

  • Kill Really Stubborn Spyware With This Tool. Brandt, Andrew // PCWorld;Jan2005, Vol. 23 Issue 1, p40 

    Reviews the HijackThis anti-spyware application software.

  • arcplan dynaSight. Palmer, Tom; Palmer, David // DM Review;Feb2005, Vol. 15 Issue 2, p70 

    Reviews the arcplan dynaSight computer software for the deployment of secure and customized dashboards, from arcplan Inc.

  • Reply to ‘Comment on “A Framework for Modelling Trojans and Computer Virus Infection”’ by E. Mäkinen. Cohen, Fred // Computer Journal;Jul2001, Vol. 44 Issue 4, p326 

    The article discusses the reaction of the author about a comment to an article titled "A Framework for Modelling Trojans and Computer Virus Infection." The author stresses that the comment was able to detail out the questionable conclusions of the article. The author also cites that the article...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics