{"id":7170,"date":"2019-10-05T22:20:14","date_gmt":"2019-10-05T22:20:14","guid":{"rendered":"http:\/\/on-line-interactivity.com\/blog\/2019\/10\/05\/everything-you-need-to-know-about-spy-2\/"},"modified":"2019-10-05T22:20:14","modified_gmt":"2019-10-05T22:20:14","slug":"everything-you-need-to-know-about-spy-2","status":"publish","type":"post","link":"https:\/\/on-line-interactivity.com\/blog\/everything-you-need-to-know-about-spy-2\/","title":{"rendered":"Everything You Need To Know About Spy"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><p><body>&#13;<\/p>\n<div align=\"center\">&#13;<\/p>\n<p><a href=\"https:\/\/on-line-interactivity.com\">&#13;<br \/>\n  <img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/on-line-interactivity.com\/blog\/wp-content\/uploads\/2019\/12\/abbtop.jpg\" width=\"800\" height=\"120\"\/><\/a><br \/><a href=\"http:\/\/www.website.ws\/kvmlm2\/my.dhtml?sponsor=geekzonehostingcom&amp;bannercode=gif002&amp;language=english\"><img decoding=\"async\" src=\"http:\/\/images.website.ws\/images\/english\/banners\/kvmlm2\/468x60_02.gif\" border=\"0\"\/><\/a><\/p>\n<p>&#13;<\/p>\n<table width=\"800\" border=\"0\" cellspacing=\"0\" cellpadding=\"5\">\n<tr>\n<td colspan=\"2\">&#13;<br \/>\n\t  &#13;<\/p>\n<div align=\"center\">&#13;<br \/>\n\t     <script type=\"text\/javascript\"><![CDATA[<!--\ngoogle_ad_client = \"pub-5712520513640847\";\ngoogle_ad_width = 728;\ngoogle_ad_height = 90;\ngoogle_ad_format = \"728x90_as\";\ngoogle_ad_type = \"text_image\";\ngoogle_ad_channel =\"\";\ngoogle_color_border = \"336699\";\ngoogle_color_bg = \"FFFFFF\";\ngoogle_color_link = \"0000FF\";\ngoogle_color_url = \"008000\";\ngoogle_color_text = \"000000\";\n\/\/-->]]><\/script><script type=\"text\/javascript\" src=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\"><![CDATA[\n         ]]><\/script>   &#13;<br \/>\n\t  \u00a0<\/div>\n<\/td>\n<p>&#13;<br \/>\n    <\/tr>\n<tr>\n<td width=\"260\" valign=\"top\">\n<p>\u00a0&#13;<br \/>\n\t  &#13;<br \/>\n\t  &#13;\n\t  <\/p>\n<div align=\"left\"><span class=\"style23\">&#13;<\/p>\n<p align=\"left\" class=\"style23\">Article Navigation <\/p>\n<p>&#13;<br \/>\n        <a href=\"index.html\"><font size=\"3\">Back To &#13;<br \/>\n          Main Page <\/font> <\/a> &#13;<\/p>\n<p\/><\/span><\/div>\n<p>&#13;<\/p>\n<p align=\"left\"\/>\n<hr\/>\n<p align=\"left\"><script type=\"text\/javascript\"><![CDATA[<!--\ngoogle_ad_client = \"pub-5712520513640847\";\ngoogle_ad_width = 250;\ngoogle_ad_height = 250;\ngoogle_ad_format = \"250x250_as\";\ngoogle_ad_type = \"text\";\ngoogle_ad_channel =\"\";\ngoogle_color_border = \"FFFFFF\";\ngoogle_color_bg = \"FFFFFF\";\ngoogle_color_link = \"0000FF\";\ngoogle_color_url = \"008000\";\ngoogle_color_text = \"000000\";\n\/\/-->]]><\/script><script type=\"text\/javascript\" src=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\"><![CDATA[\n            ]]><\/script><\/p>\n<p>&#13;<br \/>\n            \u00a0<\/p>\n<p align=\"left\"><b><a href=\"index.html\"><font size=\"4\">&#13;<br \/>\n      <span style=\"background-color: #FF6600\">Click Here<\/span><\/font><\/a><\/b><font size=\"4\"><span style=\"background-color: #FF6600\"> &#13;<br \/>\n      for more articles<\/span><\/font><\/p>\n<\/td>\n<p>&#13;<\/p>\n<td width=\"514\" valign=\"top\">\n<div align=\"left\">&#13;<\/p>\n<table width=\"99%\" height=\"114\">\n<tr>\n<td height=\"45\"><span class=\"style7\"><!-- Search Google -->&#13;<br \/>\n<center>&#13;<\/p>\n<form method=\"get\" action=\"http:\/\/www.google.com\/custom\" target=\"_top\">&#13;<\/p>\n<table bgcolor=\"#ffffff\">\n<tr>\n<td nowrap=\"nowrap\" valign=\"top\" align=\"left\" height=\"32\">&#13;<br \/>\n<a href=\"http:\/\/www.google.com\/\">&#13;<br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.google.com\/logos\/Logo_25wht.gif\" border=\"0\" alt=\"Google\" align=\"middle\" width=\"75\" height=\"32\"\/><\/a>&#13;<br \/>\n<input type=\"text\" name=\"q\" size=\"31\" maxlength=\"255\" value=\"\"\/><input type=\"submit\" name=\"sa\" value=\"Search\"\/><input type=\"hidden\" name=\"client\" value=\"pub-5712520513640847\"\/><input type=\"hidden\" name=\"forid\" value=\"1\"\/><input type=\"hidden\" name=\"ie\" value=\"ISO-8859-1\"\/><input type=\"hidden\" name=\"oe\" value=\"ISO-8859-1\"\/><input type=\"hidden\" name=\"cof\" value=\"GALT:#008000;GL:1;DIV:#336699;VLC:663399;AH:center;BGC:FFFFFF;LBGC:336699;ALC:0000FF;LC:0000FF;T:000000;GFNT:0000FF;GIMP:0000FF;FORID:1;\"\/><input type=\"hidden\" name=\"hl\" value=\"en\"\/><\/td>\n<\/tr>\n<\/table>\n<\/form>\n<p>&#13;<br \/>\n<\/center>&#13;<br \/>\n<!-- Search Google -->&#13;<br \/>\n<\/span><\/td>\n<p>&#13;<br \/>\n            <\/tr>\n<tr>\n<td align=\"left\" height=\"22\">\n<div align=\"justify\"><span class=\"style7\">&#13;<br \/>\n                <font color=\"#FB7014\" size=\"4\" face=\"Tahoma\">Everything You Need To Know About Spyware and Malware<\/font><\/span><\/div>\n<\/td>\n<p>&#13;<br \/>\n            <\/tr>\n<tr>\n<td align=\"left\" height=\"19\">\n<div align=\"justify\"><span class=\"style2\">by: &#13;<br \/>\n                <font size=\"3\" face=\"Times New Roman\" color=\"#FB7014\">Mike Christy<\/font><\/span><\/div>\n<\/td>\n<p>&#13;<br \/>\n            <\/tr>\n<tr>\n<div id=\"article\">\n<td align=\"left\" height=\"12\"><span class=\"style2\">You are at your computer, checking out software on EBay. The computer is really sluggish, and you are not running anything else. You click on a link, and BLAM you are redirected to a search page you\u0092ve never heard of and the \u0093back\u0094 button won\u0092t work.&#13;<\/p>\n<p>You\u0092ve got Spyware! Just what is \u0093Spyware?\u0094 The word brings to mind exploding pens and shoe phones. In fact, software makers have struggled to define what spyware is, and is not.&#13;<\/p>\n<p>The Anti-Spyware Coalition, a group of companies that include EarthLink, Microsoft, and Hewlett-Packard, have recently published a document that defines spyware as such: \u0093Spyware impairs users control over material changes that affect their user experience, privacy or system security; use of their system resources, including what programs are installed on their computers; or collection, use and distribution of their personal or otherwise sensitive information\u0094&#13;<\/p>\n<p>In simpler terms, spyware \u0093spies\u0094 the software on your computer, personal information, what web pages you look at, and in some cases, usernames and passwords. Ugh.&#13;<\/p>\n<p>The first spyware distribution was in 1999, and is attributed to a popular freeware program called \u0093Elf Bowling.\u0094 Many users found to their dismay that this \u0093harmless game,\u0094 was sending information to the creators, Nsoft. This spawned the first anti-spyware program in the year 2000.&#13;<\/p>\n<p>Now, both spyware and anti-spyware programs are too numerous to count.&#13;<\/p>\n<p>There are several types of software that fall under the generic description of spyware. Let\u0092s look at a few, and what they do.&#13;<\/p>\n<p>Adware \u0096 adware is an application that displays advertising banners. The reason this is criticized is that it can send information back to the company, who then \u0093targets\u0094 you with specific banners based on the web pages you\u0092ve opened. This is different from clicking on a banner for more information. This program sneaks in the \u0093back door,\u0094 not \u0093advertising\u0094 its presence. Please note that the word \u0093AdWare\u0094 is a trademark of AdWare Systems, an honest software company. They are not a part of adware, just share the unfortunate name.&#13;<\/p>\n<p>Key loggers are just that. They collect the keystrokes you make, like logging into your bank account, and send it to the hacker. Now he has your account number, user name, and password.&#13;<\/p>\n<p>Hijackers and Toolbars are another form of spyware. Hijackers take over your browser, opening pages you don\u0092t want, and preventing you from opening ones you need \u0096 like a site that tells you how to get rid of them. Toolbars are the same sort of thing. Now, you may want to have a toolbar like Yahoo or Google on your browser. They can make searches easier, and may have popup or ad blockers. The malware forms of these try to look like them, but they have completely different motives.&#13;<\/p>\n<p>Malware is a generic term for \u0093malicious\u0094 software. These programs don\u0092t just collect information; they are out to get your computer. Technically, these are not spyware, but a brief explanation seems to be in order. Malware spreads itself through the computer, changing files, making copies to send, even erasing the hard drive. Virus\u0092 and worms are a part of this group.&#13;<\/p>\n<p>Other malware programs are \u0093Trojan Horse, or Backdoor.\u0094 These hide quietly in your computer until you connect to the internet. Then they creep around your browser, \u0093reporting in\u0094 to the owner, who then uses your computer \u0093address\u0094 to send out virus\u0092s, malware, and spam. Some hackers link several computers to send so much nonsense information to a particular web site that it is overwhelmed, causing it to shut down.&#13;<\/p>\n<p>How does spyware end up on your computer? You\u0092re not going to like this . . . but most likely you loaded it on yourself! Wait! Before we get nasty letters, let us explain. Remember those \u0093smileys\u0094 you downloaded last week? How about the cute cursor the nine year old picked? Most of these \u0093free\u0094 programs have spyware attached, or imbedded in them. Even Adobe Reader loads a \u0093Yahoo search bar\u0094 when you update the reader.&#13;<\/p>\n<p>Remember when you installed the program and that gray box popped up with a thousand lines of small print? Did you read it? I doubt anyone does. The spyware distributor counts on that. If you do manage to slog through the legalese, and stuff only advanced programmers would know (or care about), there will be a few innocuous lines, something along the lines of: \u0093this program will collect information to better your enjoyment of this program,\u0094 or \u0093a web search toolbar will be added to your browser.\u0094 When you click on the \u0093accept\u0094 button to install the software, you have also agreed to the spyware program.&#13;<\/p>\n<p>Another way is when a box pops up claiming to be legitimate software needed to view the site properly, or that it is an update. It only has a \u0093yes\u0094 button, implying that you are required to allow the download. These are copying legitimate updates from places like Microsoft, or Macromedia.&#13;<\/p>\n<p>Just what is spyware going to do to your computer? Anything you can do, he can do better. It is an executable that can record keystrokes, read your files, watch your word processing program, change your home page, add and delete files, read your cookies (with personal info), then \u0093phone home\u0094 with the info. Some spyware will crash your browser if you try to uninstall it. Others may \u0093pretend\u0094 to be uninstalled, but they wait until your back is turned to load itself back on your system.&#13;<\/p>\n<p>You don\u0092t know how the stuff was loaded on your computer, but it is causing all kinds of problems. The computer is running slower, certain programs are not working, and on occasion, you see the dreaded \u0093blue screen of death.\u0094 (crash). Don\u0092t worry, you are not alone According to an October 2004 study by America Online and the National Cyber-Security Alliance, 80% of surveyed users\u0092 computers had some form of spyware, with an average of 93 spyware components per computer. 89% of surveyed users with spyware reported that they did not know of its presence, and 95% reported that they had not given permission for it to be installed.&#13;<\/p>\n<p>Now what do you do? There are several good \u0093spyware removal\u0094 programs out there. But be warned! There are also a number of programs that claim to be anti-spyware that do not work, or worse add more spyware to your system! A good resource for \u0093suspect\u0094 spyware is the list at:&#13;<br \/>http:\/\/www.spywarewarrior.com\/rogue_anti-spyware.htm They have a list of over 200 programs that claim to take care of spyware, but may not do what they claim.&#13;<\/p>\n<p>Once you get your computer \u0093clean,\u0094 how do you avoid getting \u0093dirty\u0094 again? There are firewalls and programs designed to watch for known spyware. When you register, the \u0093known spyware\u0094 definitions can be updated on a regular basis.&#13;<\/p>\n<p>You could use a browser other than Internet Explorer (most spyware exploits problems here). This writer loves Mozilla Firefox \u0096 it\u0092s free at www.mozilla.org&#13;<\/p>\n<p>Our lawmakers are doing their best to stem the tide of spyware\/malware. For example, in Washington State, USA, it is illegal for anyone other than the owner\/operator of a computer to install software that alters web browser settings, monitors keystrokes, or disables computer security software.&#13;<\/p>\n<p>The Gibson Research Corporation, www.grc.com, has several free fixes to \u0093plug holes\u0094 in Internet Explorer\u0092s security.&#13;<\/p>\n<p>There is hope. In 2005, NY Attorney General Eliot Spitzer brought suit against Intermix Media, Inc. Intermix\u0092s spyware program spread by drive-by download (loaded without permission), and installed itself in such a way it was very difficult to remove. Intermix settled for $7.5 million dollars.&#13;<\/p>\n<p>Spyware is here to stay. Your best bet is to be informed \u0096 know the tricks used by spyware to load itself. Use a firewall or spyware blocker program. Most important, understand exactly what that new program will install on your innocent computer.&#13;<\/p>\n<p>&#13;<br \/>\n About the author:<br \/>&#13;<br \/>\n &#13;<br \/>\n  ABOUT THE AUTHOR: <br \/>Mike Christy is the owner of <a href=\"http:\/\/www.spywarecenter.info\" target=\"_blank\" class=\"navigation\" rel=\"noopener noreferrer\">http:\/\/www.spywarecenter.info<\/a>which is a free information site providing the latest Spyware news and instructions on how to remove Spyware from your computer. <\/p>\n<p><font size=\"-2\">Circulated by <a href=\"http:\/\/www.geekzonehosting.com\">GeekZoneHosting.Com &#8211; Register a domain name and get hosting for your own Adsense Website just like this one<\/a><\/font>&#13;<\/p>\n<hr size=\"-1\"\/><\/span><\/td>\n<p>&#13;\n            <\/p><\/div>\n<\/tr>\n<\/table>\n<\/div>\n<p align=\"left\">\u00a0        <\/p>\n<p>&#13;\n      <\/td>\n<p>&#13;<br \/>\n    <\/tr>\n<\/table>\n<hr width=\"800\" noshade=\"noshade\"\/><a href=\"https:\/\/on-line-interactivity.com\/ADSENSEWEBSITES\">RETURN TO ADSENSE BUSINESS-IN-A-BOX MASTER ARTICLE INDEX<\/a><\/p>\n<hr width=\"800\" noshade=\"noshade\"\/>\n<div class=\"fb-share-button\" data-href=\"https:\/\/on-line-interactivity.com\/\" data-layout=\"button\" data-size=\"large\"><a target=\"_blank\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fon-line-interactivity.com%2F&amp;src=sdkpreparse\" class=\"fb-xfbml-parse-ignore\" rel=\"noopener noreferrer\">Share<\/a><\/div>\n<p>&#13;<\/p>\n<div id=\"fb-root\"\/>&#13;<br \/>\n<script async=\"\" defer=\"defer\" crossorigin=\"anonymous\" src=\"https:\/\/connect.facebook.net\/en_US\/sdk.js#xfbml=1&amp;version=v4.0&amp;appId=103650273035821&amp;autoLogAppEvents=1\"\/><!-- End of FACEBOOK SHARE BUTTON CODE --><span class=\"style6\"><br \/><span class=\"style2\">\u00a92019 - All Rights Reserved by <a href=\"http:\/\/HelpMeFindFreedom.Online\">HelpMeFindFreedom.Online<\/a><br \/><a href=\"http:\/\/www.website.ws\/kvmlm2\/my.dhtml?sponsor=geekzonehostingcom&amp;bannercode=gif002&amp;language=english\"><img decoding=\"async\" src=\"http:\/\/images.website.ws\/images\/english\/banners\/kvmlm2\/468x60_02.gif\" border=\"0\"\/><\/a><\/span><\/span><\/div>\n<p>&#13;<br \/>\n<\/body><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; \u00a0 &#13; \u00a0&#13; &#13; &#13; &#13; Article Navigation &#13; Back To &#13; Main Page &#13; &#13; &#13; \u00a0 &#13; Click Here &#13; for more articles &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; Everything You Need To Know About Spyware and Malware [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-7170","post","type-post","status-publish","format-standard","hentry","category-adsense-business-in-a-box"],"_links":{"self":[{"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/posts\/7170","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/comments?post=7170"}],"version-history":[{"count":0,"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/posts\/7170\/revisions"}],"wp:attachment":[{"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/media?parent=7170"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/categories?post=7170"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/tags?post=7170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}