2Adware Originated from software called shareware Shareware did not work well, so as the internet became popular, it evolved into adwareAdware was shareware that supported itself by displaying advertisementsGatorKazaa
3AdwareAdvertisers wanted to better target ads to people using these programs, so they began to “collect” usage informationThe term for this became “spyware”Advertisers began devising more and more intrusive ways to display advertisementsAdware switched from programs supported by advertisements to advertisements supported by programs
4SpywareInstead of coming with a program that serves a useful purpose, most spyware now seeks to merely get on your computer for the sole purpose of displaying advertismentsThis includes displaying pop-ups when you shouldn’t get them, your web browser being “hijacked”, and many other things that shouldn’t happen.
5Spyware The official definition of spyware is: Software that transmits information back to a third party without notifying the user. It is also called malware, trackware, hijackware, scumware, snoopware or thiefware. Note: Some privacy advocates also call legitimate access control, filtering, Internet monitoring, password recovery, security or surveillance software "Spyware" because it could be used without notifying the users.
6SpywareIt is believed that currently 9 out of 10 PCs that are connected to the internet are now infected by spywareAn unpatched PC connected to the internet can be infected in as little as 4 minutesSo how can someone protect themselves from spyware?
7Updates, Virus Scanners, and Firewalls Basic MeasureUpdates, Virus Scanners, and Firewalls
8Anti-Virus Everyone should have anti-virus software on their computer! Run at least once per week, along with other measures to keep your computer safe and working correctlyAnti-Spyware tools (covered later)Hiram College provides anti-virus software for youE-Trust software
9Windows UpdatesWhat it does: Updates software on your computer to plug up security holes in Windows productsSelect it from the start menuAutomatic updatingShould be run as often as anti-virus software is usedService Pack 2
18Microsoft AntiSpyware Formerly Giant AntiSpywareFree of charge
19Other tools Noteworthy commercial products: AdAware SE ProfessionalWebroot SpySweeperTrusted sources of information (and updated software):
20Safe Mode, Regedit, and Bazooka Advanced RemovalSafe Mode, Regedit, and Bazooka
21Advanced Spyware Removal Windows Safe ModeThe Windows RegistryManual Spyware Removal (with Bazooka)
22Windows Safe Mode Safe Mode – what is it? Only loads minimal Windows functions for Windows to run.User must manually start any programs they wish to use.Allows anti-spyware scanners to remove spyware more effectively.Our instructions are for Windows XP
23How to Access Windows Safe Mode Update all anti-spyware scanners with current definitions.Turn off System Restore.(Instructions coming next!)Reboot the computer.Tap the F8 key about twice per second as the computer reboots.
24Accessing Windows Safe Mode continued Select the first option, Safe Mode, and press enter.When Windows starts, run anti-spyware scanners.
26**A word of caution when using the registry!** The Windows RegistryWindows Registry – what is it?A database of configuration files needed to run Windows and programsSome spyware must manually be removed from the registryUse Google to search for instructions on how to remove the spyware**A word of caution when using the registry!**
27How to Access the Windows Registry Click on ‘Start’, and then click on ‘Run’.Type ‘regedit’ and click ‘Ok’.Follow the instructions for removing the spyware by expanding the hierarchical folders in the left column.
32Other things to keep you safe Additional MeasuresOther things to keep you safe
331: Use a pop-up blockerPop-up blockers stop pop-up ads from being displayed on your screen.Windows XP Service Pack 2 adds a pop-up blocker to Internet Explorer.If you are not using Windows XP, Google makes a pop-up blocker too. You can download it at
342: Turn off dangerous features Internet Explorer allows the use of Active X for displaying certain contentUnfortunately Active X can be very dangerous if used for malicious purposesYou can disable Active X in the security settings of Internet ExplorerYou may wish to disable other features as wellThere is a better option than crippling your features
353: Use a different Web Browser Internet Explorer is currently the most commonly used web browserThat means it is the ideal target for spyware manufacturersIf they can find an exploit in it, they can target the most number of people
363: Use a different Web Browser By using a different web browser you avoid most of these mainstream exploitsFirefox is an example of a browser alternative that an individual can useIt is free fromAnother free browser is Opera (http://www.opera.com)
373: Use a different Web Browser Alternate browsers also include other features you may find usefulMost web browser alternatives include pop-up blockersSome even have features for removing advertisements all together
384. Be Alert Many virus writers use simple tricks like misdirection Double check your sources and make sure that the link is going where you think it is
39Questions? See this information (and more) at http://cs.hiram.edu/ Feel Free to contact us at