Question:
ad-ware and viruses?
jess_n_flip
2006-12-20 13:28:40 UTC
What are the differences between these? Im not very computer bright so i have no idea what these mean....Thanks so much...and spyware whats this?
Eleven answers:
2006-12-20 13:32:06 UTC
Spyware is computer software that collects personal information about users without their informed consent. The term, coined in 1995 but not widely used for another five years, is often used interchangeably with adware and malware (software designed to infiltrate and damage a computer).



Personal information is secretly recorded with a variety of techniques, including logging keystrokes, recording Internet web browsing history, and scanning documents on the computer's hard disk. Purposes range from overtly criminal (theft of passwords and financial details) to the merely annoying (recording Internet search history for targeted advertising, while consuming computer resources). Spyware may collect different types of information. Some variants attempt to track the websites a user visits and then send this information to an advertising agency. More malicious variants attempt to intercept passwords or credit card numbers as a user enters them into a web form or other application.



The spread of spyware has led to the development of an entire anti-spyware industry. Its products remove or disable existing spyware on the computers they are installed on and prevent its installation. However, a number of companies have incorporated forms of spyware into their products. These programs are not considered malware, but are still spyware as they watch and observe with for advertising purposes. It is debatable whether such 'legitimate' uses of adware/spyware are malware since the user often has no knowledge of these 'legitimate' programs being installed on his/her computer and is generally unaware that these programs are infringing on his/her privacy. In any case, these programs still use the resources of the host computer without permission.



Adware or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used.



A computer virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the user, it hides in other program files. Though the term is commonly used to refer to a range of malware, a true virus must replicate itself, and must execute itself. The latter criteria are often met by a virus which replaces existing executable files with a virus-infected copy.
Krystle
2016-08-24 15:44:23 UTC
2
jim
2006-12-20 14:28:58 UTC
Most these people just copy pasted and expect you to understand the language used. In simple terms, a virus is a program that causes damage to all the stuff in your computer. It can slow your computer down, shut it down repeatability, or even make it not work. Luckily, there are anti-virus programs out there that will protect you from these. Some are better than others but a good, free one is AVG Anti virus available at http://free.grisoft.com . ad ware on the other hand is less destructive. It can just cause your computer to slow down, or give you annoying pop up ads. As with anti-virus programs, there are anti-adware programs. A great, free one is Ad-Aware available at http://www.lavasoft.com . Finally, spyware is something like adware. It can cause pop-ups slow your PC down and so forth. However, spyware, can track what you do on your computer such as online banking. Once you type in your name and password, the person who sent you the spyware can see it and steal all your information. Spybot Search and Destroy is a good program to remove spyware. It is availble at http://www.safer-networking.org .



To sum it all up, none of these are good things to have and should be dealt with as soon as possible. It is recommended to run anti virus/spyware/adware programs at least once a week.



Good luck!!!

(c) PC helper
2006-12-21 02:31:12 UTC
Adware is any computer program that displays advertisements while the application is running. Advertisements appear in a web browser, pop-up windows, special toolbars or within the host program. Adware also can gather information about user’s habits and interests and send it out through a background Internet connection. Such behavior allows adware vendors to deliver targeted advertisements to the end user and collect general statistics.



Adware is divided into parasitical and legitimate applications. Illegal advertising programs are very similar to spyware parasites and often have some of their functions. They can be installed without explicit user consent and work all the time a computer is on. However, they are less dangerous, because most of such parasites are primarily intended to collect user’s personal information for marketing and advertising, but not for criminal purposes.



Legitimate adware applications are harmless. They do not track user activity or record any vital information about the user and use an Internet connection only to receive advertisements. Lots of reputable advertising-supported products, such as Opera web browser or Eudora mail client, fall into this category. Vendors of these products use advertising as a legal revenue model that allows to distribute high-quality commercial software for free.



Adware can't affect you computer a lot, but it is quite annoying. Viruses are much more dangerous.



Viruses are programs that get on your computer without your knowledge and works there against your wishes. A tiny simply virus that can make a copy of itself plenty of times relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a freezing. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.
2006-12-20 23:47:14 UTC
Viruses and spywares are programs launched in the net by people to meet their self intrests. Spywares reside in your PC and spyes your actions. Virus is meant for affecting the normal performance of the PC. I can give a few links that offer free virus and spyware removers...! Norton, AVG , Avast are free antivirus software. Ad-aware, Ewido are free spyware removers. You can download free softwares at

http://fixit.in/antivirus.html and http://fixit.in/spywareremover.html
2006-12-20 19:53:37 UTC
Here is the rundown...short and sweet.Adware is a program that is created to pop up advertisments on your PC to either pester you to buy their products(scams).Or pop up pornography or gambling etc.Spyware is installed on you PC without you knowing.1 kind of spyware tracks what you do online.The other is called a keylogger which takes down what u type,including passwords,credit cards.if you find your bank account is missing some cash,you are a victim of identity theft.Viruses are created to annoy you,mostly created to crash your computer.
great one
2006-12-20 13:48:01 UTC
to put it generally

a virus is a file or program that will infect your pc and cause different actions depending on what it is, deletes files for example or causes other problems



adware or spyware is a program that is on your pc that can lead to pop ups for example
Neo
2006-12-20 13:32:13 UTC
As technology advances and more people come to rely on the Internet for information, leisure, and business it seems as if keeping your computer free of advertising is a daunting task. Not technically fitting into either the virus or spam category we have spyware and adware, which are growing concerns for Internet users. At times these programs may invade your privacy, contain malicious code, and at the very least they can be a nuisance when using a computer connected to the Internet.



Adware

Adware is considered a legitmate alternative offered to consumers who do not wish to pay for software. Programs, games or utilities can be designed and distributed as freeware. Sometimes freeware blocks features and functions of the software until you pay to register it. Today we have a growing number of software developers who offer their goods as "sponsored" freeware until you pay to register. Generally most or all features of the freeware are enabled but you will be viewing sponsored advertisements while the software is being used. The advertisements usually run in a small section of the software interface or as a pop-up ad box on your desktop. When you stop running the software, the ads should disappear. This allows consumers to try the software before they buy and you always have the option of disabling the ads by purchasing a registration key.



In many cases, adware is a legitimate revenue source for companies who offer their software free to users. A perfect example of this would be the popular e-mail program, Eudora. You can choose to purchase Eudora or run the software in sponsored mode. In sponsored mode Eudora will display an ad window in the program and up to three sponsored toolbar links. Eudora adware is not malicious; it reportedly doesn't track your habits or provide information about you to a third party. This type of adware is simply serving up random paid ads within the program. When you quit the program the ads will stop running on your system.



Spyware

Unfortunately, some freeware applications which contain adware do track your surfing habits in order to serve ads related to you. When the adware becomes intrusive like this, then we move it in the spyware category and it then becomes something you should avoid for privacy and security reasons. Due to its invasive nature, spyware has really given adware a bad name as many people do not know the differences between the two, or use the the terms interchangeably.



Spyware is considered a malicious program and is similar to a Trojan Horse in that users unwittingly install the product when they install something else. A common way to become a victim of spyware is to download certain peer-to-peer file swapping products that are available today.



Spyware works like adware but is usually a separate program that is installed unknowingly when you install another freeware type program or application. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers.



Because spyware exists as independent executable programs, they have the capability to monitor your keystrokes, scan files on the hard drive, snoop other applications, such as chat programs or word processors, install other spyware programs, read cookies, change the default home page on the Web browser, while consistently relaying this information back to the spyware author who will either use it for advertising and marketing purposes or sell the information to another party.



Licensing agreements that accompany software downloads sometimes warn the user that a spyware program will be installed along with the requested software, but the licensing agreements are not always be read completely by users because the notice of a spyware installation is often couched in obtuse, hard-to-read legal disclaimers.





Combating Spyware

While one may not realize they have installed spyware, there are some signs that it exists on your computer. If you notice any changes to your Web browser that you did not make such as extra toolbars or different homepage settings, as well as changes to your security settings and favorites list, you could have spyware running on your system. Other signs of a spyware infection include pop-up ads which aren't related to a Web site you're viewing; usually spyware advertisements are adult content in nature and are not displayed in the same fashion as legitimate ads you would normally see on your favorite Web sites. You may also see advertisements when you're not browsing the Web. Clicking hyperlinks which do not work (or take you somewhere you didn't expect), a sluggish system, or your system taking longer to load the Windows desktop are all signs that your computer may be infected with spyware.



With the onset of spyware comes a plethora of anti-spyware software packages to rid your system of these unwanted and malicious programs. Anti-spyware software works by identifying any spyware installed on your system and removing it. Since spyware is installed like any other application on your system it will leave traces of itself in the system registry and in other places on your computer. Anti-spyware software will look for evidence of these files and delete them if found.



It is important to remember that not all companies who claim their software contains adware are really offering adware. There is always a chance that adware is spyware in disguise so to speak, and that programs with embedded spyware may not state its existence at all. Always stay on the side of caution and be sure to research privacy policies and licensing agreements that come with freeware. You should also become familiar with Internet lists of companies reported to be using spyware. Much like a firewall or anti-virus program, anti-spyware software is crucial to maintain optimal protection and security on your computer and network.
arcaemous
2006-12-20 13:32:32 UTC
Wikipedia has some great explanations about these topics.
G
2006-12-20 13:40:39 UTC
Spyware is any software that covertly gathers user information through the user’s Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet. However, it should be noted that the majority of shareware and freeware applications do not come with spyware. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about E-mail addresses and even passwords and credit card numbers.



Spyware is similar to a Trojan horse in that users can unwittingly install the product when they install something else. A common way to become a victim of spyware is to download certain peer-to-peer file swapping products that are readily available on the internet. But more and more, users can be infected with spyware simply by surfing the internet. Many times spyware objects are invisibly and unethically embedded into web pages by the webmaster. And by simply visiting one of these websites, the user is unsuspectingly infected.



Aside from the questions of ethics and privacy, spyware steals from the user by using the computer’s memory resources and also by eating bandwidth as it sends information back to the Spyware’s home base via the user’s Internet connection. Because spyware is using memory and system resources, the applications running in the background can lead to system crashes or general system instability.



Because spyware exists as independent executable programs, they have the ability to monitor keystrokes, scan files on the hard drive, snoop other applications, such as chat programs or word processors, install other spyware programs, read cookies, change the default home page on the Web browser, consistently relaying this information back to the spyware author who will either use it for advertising, and/or marketing purposes, or sell the information to another party.



Licensing agreements that accompany software downloads sometimes warn the user that a spyware program will be installed along with the requested software, but the licensing agreements may not always be read completely because the notice of a spyware installation is often couched in obtuse, hard-to-read legal disclaimers.



What Is a Computer Virus



Computer viruses are actually small programs that have the ability to replicate themselves and then spread throughout your system in many ways. This is usually done without a user’s knowledge. Such programs may copy themselves to a shared network resources or mail themselves to E-Mail Contacts that are stored in your address book.



After a Virus has infected your system, it will usually trigger itself in some sort of fashion. It can launch annoying pop up windows that repeatedly place messages on your screen. It can deny you access to your data files and even change your system configuration settings. In advanced stages of infection, a virus can cause major damage to your system as it can corrupt your files and render them unreadable. It can even start deleting files as well. A virus doesn’t always have to trigger itself upon infection. It can actually be programmed to launch at a specific time or on a specific date so that there will be no obvious sign of system infection. A virus will usually disguise itself and may even attach itself to another file, so as to trick a user into running it.



Worms And Trojan Horses



A Worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well. The term worm was coined by John Brunner, a science fiction writer, in his 1975 novel Shockwave Rider. The hero, a talented programmer, created self-replicating computer programs that tunneled their way through a worldwide network.



A Trojan Horse is simply a malicious computer program that damages your computer system upon installation. The program claims to do one thing, such as pretending to be a game, but instead do something else when you run them. Some nasty Trojans will actually attempt to erase your hard drive. They were originally named after the historic Trojan horse used by the Greeks to conquer Troy because the first Trojan horse programs pretended to be innocent games or applications. Trojan horses have no way to replicate themselves automatically. Below you will find some of the various ways that viral related attacks can be transmitted and spread.



Some Ways That Viruses Can Be Transmitted And Spread



E-Mail Attachments: Email attachments are the most common way that ill intentioned people transmit viruses in order to infect computer users. Therefore, you should always apply caution when opening any E-Mail attachments received, especially from people who you do not know. These types of viruses are usually triggered when the attached file is opened or executed. Some viruses can even trigger themselves just by simply viewing the infected E-Mail although this is not that common. Therefore, ensure that the Anti-Virus Software you are using is set to monitor your E-Mail Program that you send and receive E-Mail with. Today’s modern software programs are usually set by default to do this.



Network Shared Resources: Many viruses and worms will try to duplicate themselves by finding security loop holes in a network in order to attach themselves to a shared network resource. The most vulnerable network resource are file folders, which are shared amongst users as file access permissions are being granted. When a Virus identifies a shared folder it will attempt to copy itself into it in order to infect that Computer itself and then all computers that access the shared folder. A Worm will basically just try to replicate itself. However, it is possible to limit this risk by setting access permissions for the shared folder. If your network is set up with any shared folders, then you should have your network administrator take the appropriate action to secure them.



Removable Media: Removable Media such as Floppy Disks, Re-Writable Compact and DVD Disks, Zip Disks, USB Memory and Flash Drive are often exchanged and used from one machine to another, especially in an office. Therefore, be sure to frequently scan these removable devices to prevent infection. Today’s modern Anti-Virus software will contain a built in feature where you can simply right-click on the Removal Device itself within My Computer or Windows Explorer and then choose a menu option to scan that device. In other words, if you want to scan a floppy disk, then right-click on the A: Drive within Windows Explorer and then choose a selection on the order of Scan for Viruses.



Internet Downloads: Any material downloaded from the Internet, whether they are programs, documents, music files, video files and compressed files etc., could potentially contain a virus. Therefore, be sure to scan these files first with your Anti-Virus software before you launch them. Today’s modern Anti-Virus software will usually be set to scan these downloaded files for you or at least prompt you with a reminder to do so. If not then do it manually.



Document Files: Many documents and spreadsheets can contain useful macros that perform certain tasks automatically for you. However, macro viruses also exist and they use the functionality of macros to spread themselves to other files and can make alterations to the files infected.
max_total_t
2006-12-20 13:32:46 UTC
Q: We've heard a lot about viruses and spyware as the top two threats we face today... but what's the difference between these two?



A: There are numerous differences between viruses and spyware, beginning with the underlying intentions of their authors. A virus is typically intended to destroy a user's computer or data, cause system crashes, or perform other malicious activities. In general, viruses are inherently malicious, designed to be destructive in nature. Spyware, on the other hand, is intended to operate 'under the radar'. Rather than destroying information, spyware exists to steal information and report back to the writer or a designated third party.



The following explores some of the major differences between Spyware and Viruses:



Who creates Spyware and Virus programs?

Most virus writers develop their programs predominantly to show the world how smart they are. As such, most are bent on infecting as many users as possible, to claim some degree of notoriety - and therefore bragging rights. Many want to impress their friends and fellow writers. Others use their creations to 'battle' other writers, to prove their technical expertise - a kind of game, with computer users as the innocent victims. By spraying the world's computers with the equivalent of electronic graffiti, virus authors' motivations are clearly towards being popular, showing off their programming prowess or simply with the intent of wreaking some havoc in the digital world.



Spyware programs, on the other hand, are written by software developers seeking financial gain. Spyware is the equivalent of a cash register or ATM in which the authors have many ways of making money - and new revenue schemes continuously emerge. The amount of revenue made from spyware depends on the number of computers infected, and the amount of time it can remain on the computer, free to communicate information back to a Web server. Most spyware is adware and makes its money by showing some sort of ads or by hijacking Web browsers to pages that can generate revenue for the authors.



What are the resources available for each threat author?

Virus writers are armed with their personal knowledge of systems and are often part of a group of writers who exchange information to enhance their ability in attacking a system. They create without any monetary motivation. Buggy or non-working code is common.



Conversely, spyware authors often have access to more extensive funding. They can afford to have a development process complete with labs and a testing environment to apply Quality Assurance to the programs that they are developing. Some mainstream advertisers have willingly funded spyware companies by paying for the ability to develop highly targeted advertising campaigns. With all the money being made, most authors also have access to books, as well as the ability to purchase legitimate software and attend professional training courses.



What about the legality of the byproduct?

Since viruses often lead to loss of data or corruption of the system, they have been perennially tagged as malicious, thus making their creation illegal in most countries around the world.



Spyware, however, resides in more of a gray area. Some freeware such as an electronic wallet that keeps track of your credit card numbers and passwords may function as spyware and show ads based on your shopping habits. But a user may feel the functionality of the freeware is worth the privacy invasion and the inconvenience of the pop-up ads generated by the spyware.



Plenty of spyware is also made to appear as formal software with corresponding End User Licensing Agreements (EULAs), which are not present with viruses. Some EULAs are very open about what they will do to the user's computer and how they can use the user's data - but the EULA may be as long as 20 pages or more of legal language that no average person can reasonably be expected to read or understand in its entirety. A classic spyware EULA trick is to state that part of the EULA is on a Website, which may change, and it is the user's responsibility to check the Web site for any changes. Many EULAs also state that the user implicitly agrees to any and all changes by continuing to run the software. Some even include double-negative statements like 'Do you want to discontinue the uninstallation?' This is the tricky part with spyware since it can generate defamation lawsuits against security vendors that attempt to eradicate these infections - creating a legal battle that would simply never occur in the virus world.



How do they get distributed?

Viruses typically propagate either via email - by tricking the user into launching an attachment that contains the virus code - or by exploiting system vulnerabilities. Once the code is executed, viruses are typically programmed to take control of the user's system, enabling them to perform a wide array of activities.



Spyware, in contrast, is often bundled with freeware. A simple agreement to a plug-in install on a Website you visited can lead to the introduction of spyware on a system. It is usually part of an army of distribution points where spyware from quasi-legitimate companies will put up some sort of EULA that may or may not specifically reveal its intent to monitor your computer usage and to transmit such information to the Web for the spyware company's purposes. Spyware companies find comfort in the small percentage of people who actually read a EULA in its entirety, especially a long EULA - and of those who do read it, few of them will actually understand the often-complex legal prose. As a result, the vast majority of users simply click 'Yes I Agree', without bothering to read the full agreement. Spyware companies pay a bounty per installation of their spyware, which makes it attractive to freeware authors to bundle spyware payloads with their creations as a way to generate revenue.

Q: We've heard a lot about viruses and spyware as the top two threats we face today...but what's the difference between these two?



A: There are numerous differences between viruses and spyware, beginning with the underlying intentions of their authors. A virus is typically intended to destroy a user's computer or data, cause system crashes, or perform other malicious activities. In general, viruses are inherently malicious, designed to be destructive in nature. Spyware, on the other hand, is intended to operate 'under the radar'. Rather than destroying information, spyware exists to steal information and report back to the writer or a designated third party.



What is the user experience during installation?

Viruses typically install with minimal or no interaction with the user. When the code is executed, the objective of a virus is to surreptitiously perform its propagation routine prior to administering its payload - which can include such malicious activities as data destruction, degradation or elimination of system performance.



The level of user interaction employed by spyware varies dramatically from case to case. As mentioned in Part 1, some spyware is appended to freeware and relies on the user 'agreeing' to a complicated EULA (End User License Agreement). This is done by either barraging the user with confusing questions and messages to prey on the user's impatience, or by tricking the user into agreeing to something they did not fully understand. Other common installation methods utilized by spyware authors require absolutely no user interaction whatsoever. In 'drive-by downloads', just visiting an infected Web site is sufficient to install spyware on a user's system with neither their permission, nor their knowledge. Porn and on-line shopping sites are both notorious for this type of spyware installation. Spyware is also frequently installed by hijacking legitimate software, so the user unknowingly obtains the spyware infection along with the desired software. These are just a few vehicles that enable spyware to be silently installed, without the presence of the EULA, an uninstaller, or anything else that would require any action on the part of the end user.



How difficult is it to rid your system of these threats?

Virus writers are more interested in spreading the infection to the next computer than they are with ensuring that the program remains installed on a compromised system. This is because the payload of a virus is typically executed immediately, so the damage is done. For this reason, most viruses can be successfully removed by utilizing a good antivirus product, which has been updated to include detection and removal for the specific virus or family of viruses.



But spyware is a waiting game. Since its intent is to capture and report personal information, its real value resides in how long it can remain installed on the infected system. The longer it remains installed, the more likely it is to capture the information it was programmed to steal. Therefore, spyware implements a variety of techniques to remain installed in a system. For example, a simple 'Add/Remove Programs' can appear to resolve the problem, but the action really only removes the program's visible components, while retaining the collection agent. In other cases, the program is, indeed, removed, but a piece of code is left behind, which re-installs at the next boot-up, without the user's knowledge. Another common technique for spyware is via a partnership agreement that connects it to freeware in such a way that the freeware cannot be used unless the spyware is also installed.



Spyware exhibits a strong will to live profitably on one machine, rather than to spread like viruses. It can function as a virtual ATM, generating cash for its creators, but only as long as it can keep running on a machine. Many spyware programs are programmed to go to great lengths to stay alive, or to reinstall following any attempt to remove them.



User Impact

While viruses tend to be more dangerous in nature, spyware is more of a nuisance. The pain from viruses can be loss of data or a corrupt PC. With spyware, the loss is of privacy and productivity, from the nuisance of popup ads and degradation of system performance, to the theft of personal - and sometimes sensitive - information.



Looking Forward

In the digital age, networks and computer systems are continuously evolving to become more robust, thereby maximizing our convenience and productivity. But with this progress comes new avenues for threats to the security of those networks or computer systems. Spyware and viruses are likely to continue evolving for the foreseeable future, as their authors seek out new ways to infect systems and accomplish their tasks. By understanding these threats and taking proactive measures against them, users can enjoy a rich on-line experience, while taking comfort in the knowledge that they have protected themselves from these and other attacks.


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...