Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Anti-Spyware Protection: Behind How-To Tips > NetSparsh - Viral Content you Love & Share

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a separate genre. One can find such an article about almost anything; there are even some entitled "How to Write a How-To Article". And, of course, the Web is swarming with the ones like "10 Steps to Protect Your PC from Spyware"(if not 10, any number will do; odd ones like 5,7,9 are most popular) or "How to Forget About Spyware For Good". Please don't accuse me of being sarcastic -- I am not; all these articles by all means are informative and so very useful. They all include really handy tips to protect you from this recently emerged plague called spyware. But?

A typical how-to article is short and snappy, with all unnecessary particulars carefully avoided. An ideal one is a clear scheme of what to do and how (because it is a how-to article). Some essential facts will surely be omitted just for the sake of brevity. Let's look into the author's "trash bin" for info ruthlessly (and maybe baselessly) thrown away.

Hint one: What on earth is spyware?

When you decide to apply "anti-spyware protection", you'd better realize what you want to be protected against. Unfortunately, there is not such thing as complete security. And?

"There is no such thing as spyware in itself"-- you are perplexed, aren't you? I bet you are; what's more, it was Kaspersky who recently expressed this opinion. "The term spyware is basically a marketing gimmick," wrote Kaspersky in the company weblog on March 03, 2005. "Just to separate new ersatz-security products from traditional ones, just to push almost zero-value products to the security market."

This quote (extremely curtailed and out of the context) have already spread all over the Internet, but it is very useful to read the whole posting to see the whole picture, so visit http://www.viruslist.com/en/Weblog?Weblogid=156679222

Few definitions caused so much controversy and confusion as did "spyware". Eugeny Kaspersky blames marketers for having coined this term--and partially he is right. But only partially.

As a professional, he classified various malicious programs according to their structure and characteristics; in this classification there is indeed no place for "spyware", which is too vague term to exactly denote anything with a particular structure.

On the other hand, marketers and journalists needed an expressive, easy-to-remember word to name existing (!) information-stealing programs to tell users (who may be not so versed in software as its developers) how to protect their computers.

What is "spyware" then? Spyware is a commonly used general term for any type of software that gathers personal information about the user without his or her knowledge and transmits it to a destination specified by the author of the program. Spyware applications are frequently bundled in other programs--often freeware or shareware--that can be downloaded from the Internet.

So, the term is very general and doesn't reflect either structure or characteristics of such software. After all, it is only a conventional word for programs that steal information.

According to Kaspersky, programs which are now called spyware, have existed for years. It's true. Who disagrees? Password-stealing Trojans were actually known as far back as in 1996. But it's also true that most dangerous information-stealing programs are on the rise. Spy Audit survey made by ISP Earthlink and Webroot Software (the survey lasted for a whole year 2004) showed--16.48% of all scanned consumer PCs in 2004 had a system-monitor, 16.69% had a Trojan.

Another bitter truth is that some unscrupulous producers now are jumping at the chance of making quick money. There are lots of suspicious, low-performing, or adware-installing products. See, for example, the list at http://www.spywarewarrior.com/rogue_anti-spyware.htm But saying that all the dedicated anti-spyware solutions are like that?To put it mildly, it's a bit too much.

Hint Two: Too Many Promises Made -- Is it Possible to Keep them?

There are loads of software programs nowadays created for fighting spyware. An ordinary consumer tends to get lost in plenty of information and lots of products, which are supposed to help him get rid of spyware. If all the advertising claims were true, it would have been easy. In reality it isn't.

Anti- spyware and anti-viruses work almost the same way. The efficiency of most anti-spyware programs is determined (and restricted, too) by signature bases. The more code clips (i.e. signatures) there are in the base, the more effectively the program works ? it means the more spyware programs it can identify. Only programs from the signature base are recognized as spyware; all other spy programs will be running unnoticed and unstopped.

So, absolutely all the signature- basis- containing programs are pretty much the same, whatever their ads say. They all rely on the same "match pattern"; the difference is only how many signatures each of them contains.

What conclusion we can make here? The bigger the signature base, the more reliable the product is, no matter whether it is anti-spyware or an anti-virus. If the software applies signature base, it's better to choose a product from a big company, which can afford spending plenty of money on research and updates.

Another conclusion we can make is that all such software without constant updating pretty quickly becomes useless and even dangerous, because users still expect it to protect their PCs. New spyware is constantly being developed, and anti-spyware developers have to catch up with it all the time. This race started when very first malicious programs appeared, and it is impossible to say whether it will ever end.

Alexandra Gamanenko currently works at Raytown Corporation, LLC--an independent software developing company. Software, developed by this company, does not rely on signature bases. Its innovative technology is capable of disabling the very processes of stealing information,such as keylogging, screenshoting, etc. Learn more -- visit the company's website: http://www.anti-keyloggers.com

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

CNN

Kushner-Kelly divide deepens over security clearance overhaul
CNN
The dispute has deepened a growing rift between Kelly and Kushner, who initially welcomed the new system of rigor instituted by the chief of staff but has since grown frustrated by what he views as attempts to limit his access to the President. Kelly ...
Kushner Resists Losing Access as Kelly Tackles Security Clearance ...New York Times
White House: New security-clearance policy won't affect Jared KushnerLos Angeles Times
Inside The Kushner-Kelly White House Security Clearance ShowdownHuffPost
USA TODAY -Business Insider -Newsweek -CNN
all 132 news articles »

BBC News

Young Brits 'lack cyber-security awareness'
BBC News
More than 52% of Britons aged 18-25 are using the same password for lots of online services, suggests a survey. By doing so they make it easy for hackers to hijack accounts, warned the UK government's Cyber Aware campaign. The danger was acute because ...

and more »

Knoxville News Sentinel

Knox Schools security supervisor 'didn't hear' phone during probe of Holston threat, chief says
Knoxville News Sentinel
A Knox County Schools security supervisor who was phoned “numerous times” by law enforcement and his own dispatcher as authorities raced to investigate a report of a possible planned shooting at Holston Middle School “didn't hear his phone,” his boss ...

and more »

CBS News

Mass shooting plot at SoCal high school allegedly thwarted by alert security guard
CBS News
WHITTIER, Calif. -- Authorities say they've thwarted a student's plot for a mass shooting at a Southern California high school. The Los Angeles County Sheriff's Department said Tuesday that a security guard at El Camino High School in Whittier overhead ...
Whittier School Shooting Plot Thwarted by Security Guard, Authorities SayNBC Southern California

all 20 news articles »

Knoxville News Sentinel

Ex-Knox schools security officers sue over lost jobs
Knoxville News Sentinel
The lawsuit takes primary aim at Gus Paidousis, the school system's chief of security and a former Knoxville Police Department deputy chief. He replaced Steve Griffin, the longtime security chief, who retired after questions arose about Griffin's ...


Washington Post

Abbas, Haley exchange strong criticism over Middle East at UN Security Council
Washington Post
With President Trump's Middle East peace envoys looking on, Palestinian Authority President Mahmoud Abbas on Tuesday accused the Trump administration of abdicating its commitment to a peace settlement and an independent Palestinian state. Abbas, the ...
WATCH LIVE: PA President Mahmoud Abbas addresses UN Security CouncilThe Jerusalem Post

all 332 news articles »

Toledo Blade

Police: Teenage boy stabs Washington Local security officer
Toledo Blade
A 13-year-old student is accused of stabbing a Washington Local Schools security officer Tuesday at Jefferson Junior High School. Toledo police are investigating the incident that occurred about 9:43 a.m. Craig Hanna, 57, told police he heard a knock ...
Teenager arrested after trying to stab WLS security officer13abc Action News

all 3 news articles »

Foreign Policy (blog)

At the Munich Security Conference, the United States Lacked Bravery and Leadership
Foreign Policy (blog)
To its credit, the Donald Trump administration sent an impressive team to Munich: Secretary of Defense James Mattis, national security advisor H.R. McMaster, Deputy Secretary of State John Sullivan, and Director of National Intelligence Dan Coats ...

and more »

Washington Examiner

Push for armed security in schools, same protection for 'money in a bank'
Washington Examiner
The nation's 10th largest school system this week will be urged to consider revamping security in the wake of last week's Florida school shooting rampage to include adding more armed protection in all schools. “Are our kids important enough to protect ...


The Verge

Google discloses another Windows 10 security flaw before a patch is ready
The Verge
Google disclosed a flaw in Microsoft Edge earlier this week, after Microsoft failed to patch the bug in time. Now Google's Project Zero team of security researchers are disclosing yet another Windows 10 security flaw that Microsoft has again failed to ...
Google discloses a "high" severity security flaw in Windows 10 [Update]Neowin

all 14 news articles »
Google News

Identity Theft - Dont Blame The Internet

Identity theft ? also known as ID theft, identity fraud... Read More

Computer-Virus Writers: A Few Bats In The Belfry?

"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More

A New Low

A new variation of the Nigerian Scam theme ... Read More

How to Prevent Online Identity Theft

Identity theft rates one of the fastest growing crimes in... Read More

Phishing-Based Scams: A Couple of New Ones

Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More

Technology and Techniques Used in Industrial Espionage

Industrial Espionage. These methodologies are being used on a daily... Read More

Reclaim Your PC from the Internet Spies

Viruses are, however, not the only malicious software programs out... Read More

Phishing ? Its Signs and Your Options

Phishing is the act of some individual sending an email... Read More

8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

Ebay is a great site and is used by many... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

Its War I Tell You!

There are ways to insure security though. You can get... Read More

Avoid Internet Theft, Fraud and Phishing

Since its birth, the Internet has grown and expanded to... Read More

6 Ways To Prevent Identity Theft

These six ways to prevent identity theft offer you valuable... Read More

Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc.

Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances

Spyware/adware is a new major concern for PC users everywhere.... Read More

Spy Scanners ? Don?t Compromise your Privacy

Spies, spyware, internet parasites are among what they are usually... Read More

Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information,... Read More

Temporary Internet Files - the Good, the Bad, and the Ugly

A little bit of time invested into learning about internet... Read More

How Can Someone Get Private Information From My Computer?

From the "Ask Booster" column in the June 17, 2005... Read More

Secrets On Security: A Gentle Introduction To Cryptography

Let us take the example of scrambling an egg. First,... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

Protecting Your Identity On The Internet

Afraid that someone is monitoring your PC or installed a... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can... Read More

Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can... Read More