Week 6 Day 5 CheckPoint Spyware and Adware

Week 6 Day 5 CheckPoint Spyware and Adware - removal. They...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Spyware and Adware 1 Spyware and Adware Sonja Saltzgiver Axia College
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Spyware and Adware 2 Spyware is a category of computer programs that attaches to the computers operating system in reprehensible ways. They can drain the life out of the computer's processing power. They are designed to track Internet habits or annoy the user with unwanted sales offers. Spyware usually ends up on a computer because of something the user does, like clicking a button on a pop-up window or installing a software package. Spyware can do any number of things once it's installed on a computer. Most spyware runs as an application in the background when the computer boots up, thus using RAM and processor power. It can generate endless pop-up ads that slow the Web browser so that it becomes unusable. Some spyware redirects Web searches, controlling the results and making search engines useless. There are several applications that can be turned to for reliable spyware detection and
Background image of page 2
Background image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: removal. They work like anti-virus software and may provide dynamic protection as well as detection. They will also detect Internet cookies and tell the user which sites they refer back to. One thing that can help to prevent spyware and adware are to use a pop-up blocker and many of the current browsers have the ability to block all Web sites from allowing pop-up windows. Disabling Active-X can also be done as most browsers have security settings in their preferences which allow the user to specify which actions Web sites are allowed to take on the computer. The user needs to be suspicious of installing new software. It pays to be suspicious when a site asks to install something new on the computer. Spyware and Adware 3 References Coustan, D. (2009). How Spyware Works . Retrieved July 1, 2009, from HowStuffWorks, Inc: http://computer.howstuffworks.com/spyware.htm...
View Full Document

This note was uploaded on 04/24/2010 for the course IT 205 IT 205 taught by Professor Taylor during the Spring '09 term at University of Phoenix.

Page1 / 3

Week 6 Day 5 CheckPoint Spyware and Adware - removal. They...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online