2 Adware Originated from software called shareware Shareware did not work well, so as the internet became popular, it evolved into adwareAdware was shareware that supported itself by displaying advertisementsGatorKazaa
3 AdwareAdvertisers wanted to better target ads to people using these programs, so they began to “collect” usage informationThe term for this became “spyware”Advertisers began devising more and more intrusive ways to display advertisementsAdware switched from programs supported by advertisements to advertisements supported by programs
4 SpywareInstead of coming with a program that serves a useful purpose, most spyware now seeks to merely get on your computer for the sole purpose of displaying advertismentsThis includes displaying pop-ups when you shouldn’t get them, your web browser being “hijacked”, and many other things that shouldn’t happen.
5 Spyware The official definition of spyware is: Software that transmits information back to a third party without notifying the user. It is also called malware, trackware, hijackware, scumware, snoopware or thiefware. Note: Some privacy advocates also call legitimate access control, filtering, Internet monitoring, password recovery, security or surveillance software "Spyware" because it could be used without notifying the users.
6 SpywareIt is believed that currently 9 out of 10 PCs that are connected to the internet are now infected by spywareAn unpatched PC connected to the internet can be infected in as little as 4 minutesSo how can someone protect themselves from spyware?
7 Updates, Virus Scanners, and Firewalls Basic MeasureUpdates, Virus Scanners, and Firewalls
8 Anti-Virus Everyone should have anti-virus software on their computer! Run at least once per week, along with other measures to keep your computer safe and working correctlyAnti-Spyware tools (covered later)Hiram College provides anti-virus software for youE-Trust software
9 Windows UpdatesWhat it does: Updates software on your computer to plug up security holes in Windows productsSelect it from the start menuAutomatic updatingShould be run as often as anti-virus software is usedService Pack 2
11 What you need to know about Service Pack 2 Windows Security Center, which includes:Quick-and-easy automatic updates optionsPop-up blockerMonitoring of anti-virus protectionSoftware firewall
12 Firewalls Keeps unauthorized users from entering your system Hardware and Software based firewalls
13 More on Firewalls No need to worry if you’re on the Hiram network Should be used otherwise – easy to use and you can work around them if you need to
14 AdAware, Spybot, and MS AntiSpyware Anti-Spyware ToolsAdAware, Spybot, and MS AntiSpyware
15 Anti-Spyware ToolsAdAware, Spybot, and MS AntiSpyware are all free tools that scan for and remove spywareThese three are also the most powerfulWe will show you how to use these tools in this section
16 AdAware http://www.lavasoftusa.com/ Free version available (AdAware SE Personal)Professional version also available
18 Microsoft AntiSpyware Formerly Giant AntiSpywareFree of charge
19 Other tools Noteworthy commercial products: AdAware SE ProfessionalWebroot SpySweeperTrusted sources of information (and updated software):
20 Safe Mode, Regedit, and Bazooka Advanced RemovalSafe Mode, Regedit, and Bazooka
21 Advanced Spyware Removal Windows Safe ModeThe Windows RegistryManual Spyware Removal (with Bazooka)
22 Windows Safe Mode Safe Mode – what is it? Only loads minimal Windows functions for Windows to run.User must manually start any programs they wish to use.Allows anti-spyware scanners to remove spyware more effectively.Our instructions are for Windows XP
23 How to Access Windows Safe Mode Update all anti-spyware scanners with current definitions.Turn off System Restore.(Instructions coming next!)Reboot the computer.Tap the F8 key about twice per second as the computer reboots.
24 Accessing Windows Safe Mode continued Select the first option, Safe Mode, and press enter.When Windows starts, run anti-spyware scanners.
26 **A word of caution when using the registry!** The Windows RegistryWindows Registry – what is it?A database of configuration files needed to run Windows and programsSome spyware must manually be removed from the registryUse Google to search for instructions on how to remove the spyware**A word of caution when using the registry!**
27 How to Access the Windows Registry Click on ‘Start’, and then click on ‘Run’.Type ‘regedit’ and click ‘Ok’.Follow the instructions for removing the spyware by expanding the hierarchical folders in the left column.
32 Other things to keep you safe Additional MeasuresOther things to keep you safe
33 1: Use a pop-up blockerPop-up blockers stop pop-up ads from being displayed on your screen.Windows XP Service Pack 2 adds a pop-up blocker to Internet Explorer.If you are not using Windows XP, Google makes a pop-up blocker too. You can download it at
34 2: Turn off dangerous features Internet Explorer allows the use of Active X for displaying certain contentUnfortunately Active X can be very dangerous if used for malicious purposesYou can disable Active X in the security settings of Internet ExplorerYou may wish to disable other features as wellThere is a better option than crippling your features
35 3: Use a different Web Browser Internet Explorer is currently the most commonly used web browserThat means it is the ideal target for spyware manufacturersIf they can find an exploit in it, they can target the most number of people
36 3: Use a different Web Browser By using a different web browser you avoid most of these mainstream exploitsFirefox is an example of a browser alternative that an individual can useIt is free fromAnother free browser is Opera (http://www.opera.com)
37 3: Use a different Web Browser Alternate browsers also include other features you may find usefulMost web browser alternatives include pop-up blockersSome even have features for removing advertisements all together
38 4. Be Alert Many virus writers use simple tricks like misdirection Double check your sources and make sure that the link is going where you think it is
39 Questions? See this information (and more) at http://cs.hiram.edu/ Feel Free to contact us at