From the course: Ethical Hacking: System Hacking
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Spyware types
- Spyware comes in many different categories. All can pose a serious problem, as they are designed to track your usage and capture passwords and data. Ad Networks are companies that pay software developers to display ads when viewing the site. First, the user is enticed to visit the site. Once in the site, there may be some ploy, such as a pop-up, to entice you to download a cookie. However, most of the time the software is installed without a user's knowledge or consent. The user's browsing habits are tracked so that ads can be specifically designed for them. Also, movement can be tracked as well, meaning each time you go to open an ad, or go to a site that is a particular network, this is tracked as well. A Trojan Horse, many times, is presented as a useful tool or utility through a free download. A Trojan Horse also could be bundled into a popular program and is offered as a bonus add-on in addition to the main software. It's really important to read the end-user license agreement…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.