Understanding Spyware, Pop Ups, & PC Protection John Curl Joe Hetherington Bradley Lewis Michael Wu Spyware Bradley Lewis
What is Spyware? A type of malware installed on computers that collects bits of information about users without their knowledge Can be difficult to detect Not only secretly installed on a users personal computer, but can also be installed by the owner of a
shared, corporate, or public computer to monitor other users History of Spyware First recorded use in October of 1995 in a usenet post making fun of Microsofts business model Spyware was thought of as software meant
for espionage purposes Since 2006, spyware is the biggest threat to Microsoft Windows OS, and where IE is used on computers This is because these are the most widely used Routes of Infection Does not usually self-replicate By design-exploits infected computers for
commercial gain. Routing of HTTP sites to advertisers Theft of personal information (credit card numbers, SSN, home address, etc.) Does not usually transmit infection to other computers, but instead gets on a system through exploitation of software vulnerabilities Routes of Infection(cont)
Does not usually transmit infection to other computers, but instead gets on a system through exploitation of software vulnerabilities It will deceive the user and piggyback off another program that is wanted, such as Kazaa Tricks the user into installing what looks like security software but actually isnt (Trojan
method) Spyware Examples CoolWebSearch-group of programs that take advantage of IE weaknesses Internet Optimizer-redirects IE error pages to advertising HuntBar-aka WinTools; example of how spyware installs more spyware Movieland-scheme to deceptively extract payments from
consumers MyWebSearch-spys on search habits froma toolbar Zango- transmits information to advertisers about websites that the user visits Zlob trojan-hijacks routers set to default, reports information about search history, websites, and keystrokes to a control server Effects and Behaviors Rarely alone- pc usually has multiple
infections Interferes with user control Creates unwanted CPU activity disk usage network traffic Effects and Behaviors Interferes with networking control, making it
difficult to connect to the internet Stability issues include Applications freezing Failure to boot System wide crashes Many users assume the degradation of their pc is do to hardware issues and windows
installation problems Effects and Behaviors Can collect various types of personal information Change computer settings Results in slow connection speeds Loss of internet Loss of program functionality
How to remove Spyware Back up Data Disconnect from the internet Try a traditional uninstall Scan your computer Use SmitFraudFix Get Clear Access to the problem Undo residual damage Prevent future adware and spyware
Pop ups John Curl What is a Pop Up Form of online advertising to attract traffic to other websites. Opens up a new browser window Three types- Pop up, Pop under, Hover ad
Less annoying, some users dont even realize it is there Hover Ads These ads are seem to hover over the webpage More reputable form of advertising Embedded into website using Flash Very user friendly, and the least annoying in
my opinion However not as easy to close Interactive Pop up Ads These ads attract the user, with some type of mini game that may or may not have anything to do with the product Users play the game Then linked to the company website
History of Pop Ups Pop ups have been around since the mid 90s They were seen as a much more effective form of internet marketing then the traditional banner ad. The most popular blocker back then was Popup Killer, created by Xavier Flix. In the early 2000s Opera was the 1 st browser to have a pop up blocker built in.
Pop Up Blockers Opera was the 1st major web browser to incorporate pop up blocker By 2004 IE was the last major browser to ad pop up blocking Google Toolbar is widely regarded as the best popup blocker Now a days most web browsers such as IE,
of users use pop up blockers PC Protection Michael Wu & Joe Hetherington Firewalls Regulates the traffic between computer networks Network Security Device
Blocks unauthorized access while permitting authorized communications Configured to permit or deny computer
applications based upon criteria History Firewall technology started in the late 1980s Group of engineers from Digital
Equipment Corporation (DEC) developed filter systems First Generation Packet Filters
Inspects packet Packet Filter will either accept or reject Works on the first three layers of the OSI model Second Generation Application Layer Filtering
Understands certain applications and protocols Filters information based on content
Software-Based Firewall Works on all 7 layers of the OSI model More secure and reliable than packet
filtering Third Generation Stateful filters
Known as circuit level firewalls Combines first and second generation Maintains records of all connections Determines when a packet starts a new connection, is part of an existing connection, or is an invalid packet. Personal Firewalls
Application which controls network traffic to and from a computer Differs from other firewalls in terms of scale
Designed for end-users Protects only the computer it is installed on Provides some level of intrusion detection
Allows software to terminate or block Personal Firewall Common Features
Alert the user about outgoing connection attempts Allows the user to control which
programs can and cannot access the local network and/or internet Hide the computer from port scans by not responding to unsolicited network traffic Monitor applications that are listening for incoming connections Personal Firewalls
Monitor and regulate all incoming and outgoing Internet users
Prevent unwanted network traffic from locally installed applications Provide the user with information about an application that makes a connection attempt Provide information about the destination server with which an application is attempting to communicate Sometimes gathers malware and other unwanted programs if you don't scan your computer everyday.
Personal Firewalls Common Firewall Software
Norton 360 ZoneAlarm Lavasoft Windows Defender PASSWORD PROTECTION! Password Protection Allows for only users who knows the password to access the computer
Two different methods Screen Saver Password User Password
Screen Saver Password Right Click on the Desktop
Select Properties Click on Screen Saver tab Then select the appropriate wait time And Check the On resume, password protect box Screen Saver Password User Password
Random Passwords Physical Protection Locks Keystroke Loggers Software
The maximum transverse shear occurs at the middle of the beam (y=0). Substituting y=0 into the shear stress formula for rectangular beams yields. A fine point regarding the shear stress: Remember our derivation of shear on perpendicular faces of an...
Cost-Volume-Profit (CVP) Analysis. CVP analysis is an analysis of the relationships among activity level, revenue, costs and profit. Classification of cost items into fixed and variable is paramount in CVP analysis.
The short version of the code summarizes aspirations at a high level of the abstraction; the clauses that are included in the full version give examples and details of how these aspirations change the way we act as software engineering...
Chase - vary production rates to meet changes in demand. Often used when inventory cannot be used or when resources are flexible and inexpensive to change. Level - establish average demand level and set production rate to that level. Often...
Unsystematic risk: surprises that affect "small" no. of assets Some "firm-specific" news turn into "economy-wide" events!!!` R = `R + U = `R + m + e Risk: Systematic &Unsystematic Chhachhi/519/Ch. 11 Chhachhi/BA 519/RWJ/Ch. 11 Corporate Finance/5th ed. Systematic and...
This reaction occurs with a variety of fully substituted 1,2-diols, and can be understood to involve the formation of a carbenium ion intermediate that subsequently undergoes a rearrangement. The first generated intermediate, an α-hydroxycarbenium ion, rearranges through a 1,2-alkyl shift...
Genesis as compilation of earlier, separate sources. Differing, Irreconcilable (from literal perspective) Accounts . First account is the one with which we are most familiar and is most often cited by "literalists" ...
Ready to download the document? Go ahead and hit continue!