Step 2: Know where spyware comes from

Spyware most commonly enters a computer one of two ways: silently, through a Web page, or bundled with another software program.

Spyware most commonly enters a computer one of two ways:

  1. It's loaded silently via a Web page, often through a pop-up window or a hidden frame. No warning is given that the page is attempting to install a program, unless the Web browser is specifically designed to warn the user of such things. (The first edition of Internet Explorer 6 and all previous versions of Internet Explorer were vulnerable in this fashion.)

  2. It's bundled with another software program, often as a way of generating advertising revenue to support that program's development.

The first of these two vectors is by far the most broadly used -- especially in organizations where desktops have not been correctly secured and browser plug-ins can install with impunity. The second isn't as widespread, but still popular, since you may install what you think is a free application and only find out later that it's harboring spyware.


How to remove spyware

 Home: Introduction
 Step 1: Get familiar with spyware now if not already
 Step 2: Know where spyware comes from
 Step 3: Recognize how spyware acts
 Step 4: Understand what damage spyware can cause
 Step 5: Choose tools to clean up spyware
 Step 6: Use these advanced techniques to clean up spyware
 Step 7: Install service packs to prevent spyware infections
 Step 8: Take additional initiatives to prevent spyware infections
 Step 9: Plan ahead for new spyware tactics

ABOUT THE AUTHOR:
Serdar Yegulalp
Serdar Yegulalp is the editor of the Windows 2000 Power Users Newsletter. Check it out for the latest advice and musings on the world of Windows network administrators -- and please share your thoughts as well!
Copyright 2005 TechTarget
This was last published in June 2005

Dig Deeper on Network intrusion detection and prevention and malware removal

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchVirtualDesktop

SearchWindowsServer

SearchExchange

Close