- It's loaded silently via a Web page, often through a pop-up window or a hidden frame. No warning is given that the page is attempting to install a program, unless the Web browser is specifically designed to warn the user of such things. (The first edition of Internet Explorer 6 and all previous versions of Internet Explorer were vulnerable in this fashion.)
- It's bundled with another software program, often as a way of generating advertising revenue to support that program's development.
How to remove spyware
Step 1: Get familiar with spyware now if not already
Step 2: Know where spyware comes from
Step 3: Recognize how spyware acts
Step 4: Understand what damage spyware can cause
Step 5: Choose tools to clean up spyware
Step 6: Use these advanced techniques to clean up spyware
Step 7: Install service packs to prevent spyware infections
Step 8: Take additional initiatives to prevent spyware infections
Step 9: Plan ahead for new spyware tactics
|ABOUT THE AUTHOR:|
Serdar Yegulalp is the editor of the Windows 2000 Power Users Newsletter. Check it out for the latest advice and musings on the world of Windows network administrators -- and please share your thoughts as well!
Copyright 2005 TechTarget
This was first published in June 2005