Spyware most commonly enters a computer one of two ways:
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
- It's loaded silently via a Web page, often through a pop-up window or a hidden frame. No warning is given that the page is attempting to install a program, unless the Web browser is specifically designed to warn the user of such things. (The first edition of Internet Explorer 6 and all previous versions of Internet Explorer were vulnerable in this fashion.)
- It's bundled with another software program, often as a way of generating advertising revenue to support that program's development.
How to remove spyware
Step 1: Get familiar with spyware now if not already
Step 2: Know where spyware comes from
Step 3: Recognize how spyware acts
Step 4: Understand what damage spyware can cause
Step 5: Choose tools to clean up spyware
Step 6: Use these advanced techniques to clean up spyware
Step 7: Install service packs to prevent spyware infections
Step 8: Take additional initiatives to prevent spyware infections
Step 9: Plan ahead for new spyware tactics
|ABOUT THE AUTHOR:|
| Serdar Yegulalp
Serdar Yegulalp is the editor of the Windows 2000 Power Users Newsletter. Check it out for the latest advice and musings on the world of Windows network administrators -- and please share your thoughts as well!
Copyright 2005 TechTarget