Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Anti-Spyware Protection: Behind How-To Tips > NetSparsh - Viral Content you Love & Share

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a separate genre. One can find such an article about almost anything; there are even some entitled "How to Write a How-To Article". And, of course, the Web is swarming with the ones like "10 Steps to Protect Your PC from Spyware"(if not 10, any number will do; odd ones like 5,7,9 are most popular) or "How to Forget About Spyware For Good". Please don't accuse me of being sarcastic -- I am not; all these articles by all means are informative and so very useful. They all include really handy tips to protect you from this recently emerged plague called spyware. But?

A typical how-to article is short and snappy, with all unnecessary particulars carefully avoided. An ideal one is a clear scheme of what to do and how (because it is a how-to article). Some essential facts will surely be omitted just for the sake of brevity. Let's look into the author's "trash bin" for info ruthlessly (and maybe baselessly) thrown away.

Hint one: What on earth is spyware?

When you decide to apply "anti-spyware protection", you'd better realize what you want to be protected against. Unfortunately, there is not such thing as complete security. And?

"There is no such thing as spyware in itself"-- you are perplexed, aren't you? I bet you are; what's more, it was Kaspersky who recently expressed this opinion. "The term spyware is basically a marketing gimmick," wrote Kaspersky in the company weblog on March 03, 2005. "Just to separate new ersatz-security products from traditional ones, just to push almost zero-value products to the security market."

This quote (extremely curtailed and out of the context) have already spread all over the Internet, but it is very useful to read the whole posting to see the whole picture, so visit http://www.viruslist.com/en/Weblog?Weblogid=156679222

Few definitions caused so much controversy and confusion as did "spyware". Eugeny Kaspersky blames marketers for having coined this term--and partially he is right. But only partially.

As a professional, he classified various malicious programs according to their structure and characteristics; in this classification there is indeed no place for "spyware", which is too vague term to exactly denote anything with a particular structure.

On the other hand, marketers and journalists needed an expressive, easy-to-remember word to name existing (!) information-stealing programs to tell users (who may be not so versed in software as its developers) how to protect their computers.

What is "spyware" then? Spyware is a commonly used general term for any type of software that gathers personal information about the user without his or her knowledge and transmits it to a destination specified by the author of the program. Spyware applications are frequently bundled in other programs--often freeware or shareware--that can be downloaded from the Internet.

So, the term is very general and doesn't reflect either structure or characteristics of such software. After all, it is only a conventional word for programs that steal information.

According to Kaspersky, programs which are now called spyware, have existed for years. It's true. Who disagrees? Password-stealing Trojans were actually known as far back as in 1996. But it's also true that most dangerous information-stealing programs are on the rise. Spy Audit survey made by ISP Earthlink and Webroot Software (the survey lasted for a whole year 2004) showed--16.48% of all scanned consumer PCs in 2004 had a system-monitor, 16.69% had a Trojan.

Another bitter truth is that some unscrupulous producers now are jumping at the chance of making quick money. There are lots of suspicious, low-performing, or adware-installing products. See, for example, the list at http://www.spywarewarrior.com/rogue_anti-spyware.htm But saying that all the dedicated anti-spyware solutions are like that?To put it mildly, it's a bit too much.

Hint Two: Too Many Promises Made -- Is it Possible to Keep them?

There are loads of software programs nowadays created for fighting spyware. An ordinary consumer tends to get lost in plenty of information and lots of products, which are supposed to help him get rid of spyware. If all the advertising claims were true, it would have been easy. In reality it isn't.

Anti- spyware and anti-viruses work almost the same way. The efficiency of most anti-spyware programs is determined (and restricted, too) by signature bases. The more code clips (i.e. signatures) there are in the base, the more effectively the program works ? it means the more spyware programs it can identify. Only programs from the signature base are recognized as spyware; all other spy programs will be running unnoticed and unstopped.

So, absolutely all the signature- basis- containing programs are pretty much the same, whatever their ads say. They all rely on the same "match pattern"; the difference is only how many signatures each of them contains.

What conclusion we can make here? The bigger the signature base, the more reliable the product is, no matter whether it is anti-spyware or an anti-virus. If the software applies signature base, it's better to choose a product from a big company, which can afford spending plenty of money on research and updates.

Another conclusion we can make is that all such software without constant updating pretty quickly becomes useless and even dangerous, because users still expect it to protect their PCs. New spyware is constantly being developed, and anti-spyware developers have to catch up with it all the time. This race started when very first malicious programs appeared, and it is impossible to say whether it will ever end.

Alexandra Gamanenko currently works at Raytown Corporation, LLC--an independent software developing company. Software, developed by this company, does not rely on signature bases. Its innovative technology is capable of disabling the very processes of stealing information,such as keylogging, screenshoting, etc. Learn more -- visit the company's website: http://www.anti-keyloggers.com

In The News:


Forbes

A Security CEO and Two Hackers on Building a Safer Internet, Powered by a Community of Hackers
Forbes
In recent years technology has become an increasing mainstay of businesses in how they present their products and engage their customers. The net effect of this is more and more companies building internal software engineering teams (or depending on ...

and more »

New York Times

Security Officers Fired for United Airlines Dragging Episode
New York Times
Two airport security officers in Chicago have been fired for their roles in an episode in which a screaming passenger was violently dragged from a United Airlines flight in April — an act that was captured on video, sending the airline into a public ...
Chicago fires 2 security officers in United Airlines passenger dragging caseCBS News

all 60 news articles »

snopes.com (blog)

Is the Mandalay Bay Security Guard 'Missing'?
snopes.com (blog)
In the days following the 1 October 2017 mass shooting in Las Vegas, various conspiratorial web sites and Internet personalities began casting aspersions on a wounded Mandalay Bay security guard, falsely claiming he was an “accomplice” to gunman ...
Jesus Campos, Vegas security guard shot before rampage, appears to have vanishedLos Angeles Times
LA Times: The Mandalay Bay Security Guard Has Apparently Vanished UPDATE: MGM Knows Where He IsTownhall
Security Experts Predict Changes in the Wake of Las Vegas MassacreNBCNews.com
Fox5NY -Daily Mail -Fox News
all 99 news articles »

TechCrunch

BuddyGuard raises €3.4M for its home security camera powered by AI
TechCrunch
BuddyGuard, the Berlin startup behind the Flare AI-powered home security camera, has raised €3.4 million in new funding, money it plans to use to ramp up marketing of the newly-launched device. Leading the round is German electrical specialist Bachmann ...

and more »

Ars Technica

Google now offers special security program for high-risk users
Ars Technica
Today, Google rolled out a new program called Advanced Protection for personal Google accounts, intended to provide much higher account security to users of services like Gmail and Drive who are at a high risk of being targeted by phishers, hackers ...
Gmail will add security features for targets of hackersNew York Post
Google is rolling out advanced Gmail security for government officials and journalistsCNBC
If you're willing to trade ease-of-use for security, Google has a new feature for youQuartz
The Hill -TechCrunch -Engadget
all 83 news articles »

Bloomberg

Haley to Press UN Security Council on Iran After Trump Decision
Bloomberg
Haley, the U.S. ambassador to the United Nations, will use a Wednesday Security Council meeting on “the situation in the Middle East" to once again take on Tehran's ballistic-missile program and its support for Hezbollah and Syrian ruler Bashar Al ...

and more »

RadioFreeEurope/RadioLiberty

Bombing Targets Pakistani Security Forces, Killing At Least Seven
RadioFreeEurope/RadioLiberty
Pakistani officials say a bomb attack on the outskirts of the southwestern city of Quetta has killed at least six members of the country's security forces and one civilian. The Pakistani Taliban, a militant group fighting Pakistan's government, claimed ...

and more »

KRACK WiFi Security Fixes Are Coming, But You Need to Take Control
ConsumerReports.org
The revelation this week that a serious security flaw could affect WiFi networks in homes and businesses highlights how tough it can be for consumers to keep vital technology updated with secure software. Millions of households rely on wireless routers ...

and more »

Bloomberg

Homeland Security Must Reveal Why It Ended 'Dreamers' Policy
Bloomberg
A federal judge in San Francisco who is overseeing five lawsuits challenging the September announcement to end Deferred Action for Childhood Arrivals, or DACA, said Tuesday that Homeland Security must turn over all emails, letters, memos, notes and ...

and more »
Google News

Criminals are Fishing For Your Identity

What is Phishing? In a typical Phishing attack, a criminal... Read More

Computer Security

What is computer security? Computer security is the process of... Read More

Reporting Internet Scams

When it comes to reporting Internet scams most of us... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

Is Your Email Private? Part 1 of 3

In a word, no - an email message has always... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More

Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is

A week or so ago, I received an inquiry from... Read More

Mall Protection

The Loss Prevention Manager should be receptive to the needs... Read More

Viruses, Trojans, and Spyware - Oh My!

Have you ever had to call Symantec or McAfee to... Read More

Detect Spyware Online

You can detect spyware online using free spyware cleaners and... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would... Read More

How to Protect Your Child from the Internet

When the Internet first came about, it was realized it... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information,... Read More

Securities

NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More

Virus Nightmare..Lessons Learned

I got a virus the other day, Thursday I believe... Read More

HackAttack

P C. owners are constantly at risk from attacks by... Read More

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons... Read More

How To Cover Your Tracks On The Internet

Every single time you access a website, you leave tracks.... Read More

Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Airport Menace: The Wireless Peeping Tom ---------------------------------------- As a network... Read More

Is That Free Stuff Like An iPod Or Desktop Computer Really Free?

Have you seen the web site, www.freestuff.com? Or have you... Read More

Spyware, What It Is, What It Does, And How To Stop It

Spyware is software that runs on a personal computer without... Read More

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

Spyware Attacks! Windows Safe Mode is No Longer Safe

Many of us have run into an annoying and time-consuming... Read More

Protecting Your Children On The Internet

If you are a parent, as am I, I think... Read More