Monday, June 01, 2009
What is Adware?
Some of the adware is licensed as shareware. In this way, the word is used to make distinction between different types of shareware available on the Internet. In comparison to other software products, an adware is primarily advertising-supported. An adware may offer its users an option to upgrade to a ‘registered’ or ‘licensed’ copy to do away with any annoying advertisements.
An adware is usually harmless to the user but the real concern is that it often morphs into a spyware, in which information about the user's activity is tracked, reported, and often re-sold, often without the knowledge or consent of the user. This can go a step further and turn into a malware that may interfere with the normal functioning of other software applications, in order to force the users to visit a particular web site.
People often confuse the term ‘adware’ with ‘spyware’ and ‘malware’, especially since all these concepts are closely related to each other. For example, if one user installs an ‘adware’ on a computer, and consents to a tracking feature, the ‘adware’ turns into a ‘spyware’. When another user visits that computer, and interacts with it, he is also tracked by the ‘adware’ without their prior consent that makes it a ‘malware’.
Increasing reports of Spyware have prompted a loud outcry from computer security experts and privacy advocates around the world. Often, spyware applications send the user's browsing habits to an ad-serving company, which then indulges in targeted advertising based on the users’ interests.
Adware programs other than spyware do not invisibly collect and upload the activity record or personal information when the user of the computer has not approved of such a transfer. However, some adware vendors maintain that applications offerred by them are not spyware due to the disclosure of the program activities: for example, a product vendor may indicate a clause in the product's Terms of Use that third-party software will be included in the package that may collect and report on the computer usage. Such a disclosure in the Terms of Use makes it an adware.
A number of software applications are available to help the common computer users search for and modify adware programs to block the presentation of advertisements and to remove any accompanied spyware modules. To avoid a backlash, as with the advertising industry in general, creators of adware must balance their attempts to generate revenues with users' desire to be left alone.
Emmanuel Aigbehi
What is Phishing?
With a substantial growth in the number of reported phishing incidents around the world, various measures are being employed to combat this menace which include user training, technical measures, and legislative provisions to make this a criminal offence with severe punitive measures. The term phishing is a variant of fishing, probably influenced by phreaking, and alludes to the use of increasingly sophisticated lures to ‘fish’ for a user's financial information and passwords.
Emmanuel Aigbehi
What is a BotNet?
Although the term ‘botnet’ can refer to a group of software robots such as the IRC bots, it is generally used to refer to a collection of computers (called zombie computers) whose security has been compromised and which are used for running malicious programs such as Trojan horses, viruses, worms etc. under a common command and control infrastructure. A botnet's originator, also referred to as the ‘bot herder’ can exercise remote control over the group of computer systems, usually through means such as the Internet Relay Chat (IRC).
Individual programs manifest themselves as IRC ‘bots’. Quite often, the command and control is exercised via an IRC server or a specific channel on a public IRC network. Newer bots have the capability to automatically scan their environment and propagate themselves using vulnerabilities such as weak passwords. Generally, the more vulnerabilities a bot can scan and propagate through, the more valuable it becomes to a botnet controller community. The process of stealing computing resources as a result of a system being joined to a ‘botnet’ is given a unique name called ‘scrumping’.
Although hidden, Botnets have become a significant part of the Internet. Since a majority of the conventional IRC networks are taking preventive measures and blocking access to the previously-hosted botnets, the bonet controllers continuously strive to find their own servers. Often, a botnet spans a variety of connections ranging from cable, dial-up, ADSL and a variety of different types of networks including corporate, educational government and even the military networks.
Of late, several botnets have been found and removed from the Internet.
Internationally coordinated large scale efforts to shut down botnets have also been initiated around the globe. Despite all these efforts, it has been estimated that up to a quarter of all personal computers connected to the internet are part of some botnet.
Emmanuel Aigbehi
What is a Zombies?
Since the computer system in such a scenario tends to be unconscious, it is metaphorically compared to a zombie. Zombies have been used extensively to send e-mail Spam. In the year 2005, zombie computers sent an estimated 50–80% of the global Spam. The use of Zombies allows the spammers twin advantages of avoiding detection as well as reducing their bandwidth costs, since the owners of zombies pay for the bandwidth consumed by such systems.
Due to the advantages offered by the use of zombies, they are frequently employed to commit click fraud against the web sites that display pay per click advertisements. Other frequent uses include hosting phishing websites or money mule recruiting websites.
Zombies have also been used to conduct distributed denial of service attacks. In the year 2000, several prominent Web sites such as Yahoo and eBay etc were clogged to a standstill by a distributed denial of service attack undertaken by zombies.
Want to find out more about USB Encryption, then visit Anthony Andrews's site on how to choose the best Protected USB for your needs.
What is Worm?
When any such machine is discovered, it copies itself to the new machine exploiting the same security flaw and starts replicating from there as well. This process continues unabated. In this way, a worm continues to copy itself from machine to machine while eating up the computer time and network bandwidth in the process and they may also have some sinister intent. An infectious worm could clog the Internet very effectively and bring the global network to a standstill due to a severe resource crunch.
Emmanuel Aigbehi
What is a Virus?
Emmanuel Aigbehi
What is Malware?
The perceived intent of the creator is a prime consideration in designating a particular software as malware. Malware includes computer viruses, spyware, trojan horses, worms, dishonest adware, and other unwanted and malicious software. However, malware should not be confused with defective software that has a legitimate purpose but contains harmful bugs due to a poor design.
A majority of the common computer users are unfamiliar with this generic term and therefore never use it. Instead, the term ‘computer virus’ is used in common parlance and usually in the general media to describe all kinds of malware, despite the fact that all malware cannot be categorized as a virus. Another common term used for malware is Badware. It refers to the bad characteristics of malware and is most likely a corruption of the term ‘Malware’.
Emmanuel Aigbehi
What is Computer Security?
Computer security is a term that we hear increasingly nowadays. With the arrival of home PCs, computers have become household electronic gadgets that are used for a variety of purposes such as word processing, music, e-mail, and gaming etc. Since the PCs also hold significant amounts of personal data (credit card numbers and bank account details etc.) they have become enticing targets for the hackers. This is a primary reason behind an explosive growth in the computer security discipline within the larger context of the Information Technology (IT) domain. An accelerated growth in the Information and Communication Technologies (ICT) has brought the computer security issues into the limelight. The term ‘computer security’ may be defined as:
An effort to create a secure computing platform, designed in such a way that the agents (users or programs) can only perform some limited/allowed actions. This involves specifying and implementing a stringent security policy that includes protection of information assets through the use of technology, processes, and training. It also includes the various measures and controls to ensure the security and availability of the information that is processed, stored, and transmitted by a computer system over a network.
Emmanuel Aigbehi