Tuesday, September 10, 2019

Spyware and Viruses Term Paper Example | Topics and Well Written Essays - 4250 words

Spyware and Viruses - Term Paper Example Moreover, it can be used as a kind of adware, whereby the unsolicited pop-up ads are delivered by the software on top of tracking the behavior of the user. Characteristically, the software is installed when the owner is doing the installation of a kind of free software that they really needed (Parikka, 2007). When the software that is being installed by the user is completed, the spyware will attach itself to the installation and begin the collection of data from the activities of the user or the owner. The user of the computer can also be cheated or tricked into the installation of the software via a Trojan horse when it pretends to be piece of security software offered for free. The creators of spyware have been known for paying the developers of shareware to bundle their software with the authentic software and just repackaging the freeware as well as bundling it with their individual spyware (Parikka, 2007). Another way of spyware installation on an unaware computer user is drive-by downloading. Some of the earliest or first spyware did not do much than reporting to the creators every time the program was put to use. It was aimed at aiding marketing or even monitoring usage for the purposes of licensing. Although that is still happening, we find that a lot of nowadays is intended to steal private and valuable information such as the passwords and usernames for email accounts, bank sites, online games and social networking sites (Parikka, 2007). One might never be aware of the fact that they have malicious spyware on their computer, as it seems to operate in the background in a quiet manner and the explicit quality and functionality of the program might be very attractive. They are usually distributed as either ‘freeware’ or even ‘shareware’ with little or no license restrictions for the purposes of trapping as many individuals as possible. On

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.