Spy tricks for 2005

The ways that spyware is used to deceive computer users are numerous, increasing rapidly with the appearance of spyware. However, we would like to list nine methods that spyware is the most popular in 2005. Nine ways

Spy tricks for 2005 Picture 1Spy tricks for 2005 Picture 1 The ways that spyware is used to deceive computer users are numerous, increasing rapidly with the appearance of spyware. However, we would like to list nine methods that the most popular spyware in 2005.

These nine ways are also the methods associated with popular events this year involving these spies.

1. Spyware spreads based on the vulnerability found by many popular programs such as Windows Media Players (occurring in January 2005, patched by Microsoft).

2. Spyware hides the fact that it is installed by using Rootkit (a tool written by a hacker to get rid of the testing tools installed on the computer), of course, if you have 'toothed weapon' and careful in operation on the screen, there's nothing to worry about. Maybe for example two programs: Internet Media's Elitetoolbar and ContextPlus' Apropos and PeopleonPage .

3. A piece of code written in Java can be infected with IE if a machine uses both operating systems simultaneously as FireFox and IE . This error has also been patched.

4. Spam, Adware, Keyloggers, linking to advertising websites, websites with 'heavy' pornographic content. If you miss an infection they are also very troublesome. For example, 180solutions , Direct Revenue, SurfSidekick , BullsEye Network and ShopAtHomeSelect .

5. Spyware programs spread through 'chat' programs. You can refer to the list at SunbeltBLOG and Spyware Warrior websites. The characteristics of these programs are the continuous spread of advertising, through IRC.

6. Other Trojan and Spyware antispyware programs can be found, such as PSGuard , Razespyware, SpySheriff , Spy Trooper, WorldAntiSpy and most recently SpyAxe that we have mentioned to you. These are phishing antispyware programs.

7. The 'profits' from ads you get when using Bit Torrent and Aurora . These are very attractive services on the network, along with spyware as "profits" that you must embrace.

8. The AIM worms carry tools to help infiltrate large-scale attacks from the Middle East

9. And the most famous thing is probably that Sony had to recall more than 2.1 million records of its music because the music disc installed DRMs to track customers in an unauthorized manner. This way of infection is said to be elite and formal.

After all, spyware is not susceptible to infection. If you are a cautious person using computers, carefully install protection programs, before any installed spyware has warning signs and you can prevent it. A second hope is the new anti-virus technology Rudra was just born in India.

4 ★ | 1 Vote