Spyware comes in many different categories, all can pose a serious problem as they are designed to track your usage, and capture passwords and data. Lisa covers spyware and how advertisers lure you to sites in order to infect your system Methods include Ad networks, cookies, Keyloggers, and Trojan Horses.
- View Offline
- Spyware comes in many different categories.…All can pose a serious problem,…as they are designed to track your usage…and capture passwords and data.…Ad Networks are companies that pay software developers…to display ads when viewing the site.…First, the user is enticed to visit the site.…Once in the site, there may be some ploy,…such as a pop-up, to entice you to download a cookie.…However, most of the time the software is installed…without a user's knowledge or consent.…
The user's browsing habits are tracked…so that ads can be specifically designed for them.…Also, movement can be tracked as well,…meaning each time you go to open an ad,…or go to a site that is a particular network,…this is tracked as well.…A Trojan Horse, many times, is presented…as a useful tool or utility through a free download.…A Trojan Horse also could be bundled into a popular program…and is offered as a bonus add-on in addition…to the main software.…
It's really important to read the end-user license agreement…before installing any software,…
These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Acquiring passwords
- Generating rainbow tables
- Understanding where passwords are stored
- Defending against privilege escalation
- Understanding spyware
- Protecting against keylogging
- Detecting steganography
- How hackers cover their tracks