Search For Any I.T Related Information

Monday, January 3, 2011

Widgets

Difference between Malware, Adware and Spyware

Posted on 7:39 AM by Unknown

What is the Difference between Malware, Adware and Spyware

What is the Difference between Malware, Adware and Spyware

Computer infiltration by virtual parasites is as big and feared a threat today, as swine flu. Malwares, adwares, spywares and other viruses can do a lot of harm to your computers, which can be very expensive to sort out. Here I present the differences between the broad categories of malwares, adwares and spywares.

Trend Micro's 'Computer World Article', dated 16th January 2004, estimated that computer viruses costed world businesses around $55 billion in 2003. On a more personal front, I spent an entire month's salary to sort out my laptop, when it became obvious that it had become a virus breeding center. I have neutered my laptop now with a good detection and removal software package, but it still keeps me in a state of anticipatory worry. Some problem areas are malwares, adwares, spywares and computer viruses. Today I will try to give an in-depth coverage of information on three of these data security threats - namely malwares, adwares and spywares.

Malwares

According to F-secure, the year 2007 has seen more production of malware that the previous 20 years, all put together. Malware is a linguistic blend of the two words, 'malicious' and 'software'. These softwares are designed with the intent to harm a computer system, through a sneaky infiltration. Malwares are hostile, annoying computer codes that intrude in the working of a computer system, without the owner's consent. Malwares are considered a computer contaminant legally in several US states. They enter a computer system through the pathways of the world wide web.






Malwares were initially just pranks, but were later on backed by hostile intent and led to vandalism. Malwares harm the computer and results in loss of data. They are capable of destroying the files stored in the computer hard disk. Some even take over the computer's control and make the user's computer a host for contraband data, and engage in automatic sending of spam mails, etc. Malwares are also dangerous when the malware creator installs a key logger in its programming code. This registers the user's keystrokes when he enters passwords, personal and professional information, banking details, etc. This can lead to
Internet scams, frauds and thefts.

Malwares are malicious codes that include viruses, worms, trojan horses, etc. Virus and worms are two best known types of malwares. They differ in their speed of infestation - viruses spread with the execution of infected software, while worms actively multiply and transmit themselves over the network. Kraken Botnet, the Storm Worm, April Fool's Day and Zotob are some well known malwares.


Adwares

Adwares are softwares that display unsolicited advertisements, that pop-up at occasional intervals and unnecessarily pester the user. Some adwares are also types of spywares, especially when they decipher the user's web surfing history and display relevant advertisements only. Adwares also exhibit other spyware-type behaviors, like reporting on a user's website visits, etc. This collected data is often used for advertising impressions selected to be targeted at the user.


Though the goal of adware creators is not to damage, adwares can be extremely persistent in their pop ups, and the computer user is likely to get irritated with them. Many adware distributing companies generate revenues from their adwares, by noting the history of sites visited by users, and then throwing specific ads, that pertain to their area of interest, at them. The best way to deal with adwares is, not to click on the
pop-up ads, delete strange email attachments and install adware removal/blocking softwares on your computers. Bonzi Buddy, Gator, Kazaa and Zango are some famous adwares.

Spywares

Spyware in simple words, generally applies to privacy invading softwares. Spyware is a strictly for-profit malware, that is encoded to track users' web browsing habits and display unsolicited advertisements, with the intention of redirecting users to other websites. They directly help in the generation of marketing revenues for the spyware creator. Spywares do not spread like viruses, and are in fact installed on users' computers by exploiting security
loopholes and OS (operating system) design defects. They even come in packages with other user friendly softwares and get automatically activated on the user's computer, when the software is installed. Spywares are also often dropped as a payload by worms.
Spywares are sneakily installed on computer systems to collect user and computer information without the user's knowledge and consent. Some spywares can interfere with the user's control on his computer by installing new softwares on its own and by redirecting web browser activity. They are capable of redirecting search engine results pages to paid advertisements. Spywares can effect a change in computer settings and result in slow Internet connection speed, loss of Internet functionality and changes in home page settings as well. Unlike viruses and worms, spywares do not self-replicate, but just like them, they exploit infected computers for commercial gain.


The problem with
spywares is that they are often downloaded onto their system, by clueless users, as distributors often present them as useful and harmless utilities. Unfortunately, with its own threats, spywares also open up the computer to other attacks, as they create entrance holes in the system. Spywares are thus, rarely the lone infections on a computer; and when a spyware is noticed, it is best to go for a complete system clean up. Their dangers include unwanted and erratic computer behavior, unwanted CPU activity, additional usage of memory and an unnecessary increase in network traffic, along with problems like application freezing, booting failures, system-wide crashes, etc.

'
Phishing' is similar to spywares and is considered as a Internet crime. It uses social engineering, to make users volunteer their personal information while filling of forms. Famous examples of spywares are CoolWebSearch, Internet Optimizer (DyFuCa) and Movieland (Moviepass.tv or Popcorn.net).

All Three - Compare and Contrast

Adwares are the best way to offer applications for free or at a low cost. Spywares are a progression of adwares that produce more targeted advertisements. Malwares send out automatic email spams and redirect users to unintended sites. Adwares and spywares progress to malicious softwares (malwares), if they start to affect computer activity actively, instead of just showing passive advertisements to the user. It is basically the intent that separates the three - spywares are for privacy invasion, adwares are for revenue generation through pop up advertisements and malwares cause harm to a user's computer system, borne out of pranks or personal and professional vendettas.

All three are harmful to your computer systems. While some are mere nuisances, others are active parasites that can seriously damage your computer. It is best to get
spyware removal programs installed on your system as soon as possible. It is one of the effective ways to get rid of them.

By Sayali Bedekar Patil
Feel Free to share this blog post with your friends using the share buttons below this post.

If you have anything to contribute or ask, Kindly make use of the comment form below.

Please, do not forget to SUBSCRIBE to this blog, so that you can be receiving future Information Technology News,money making tricks,browsing cheat latest I.T Jobs,latest I.T career article DIRECTLY into your email inbox, even when you are not online.

We also offer Computer Engineering and Networking Training,Sales of both Laptop and Desktop Computer @ a very cheap price

NOTE: If the LINKS are NOT clickable, it simple means you are not reading this at www.olamoshsystem.com. So, visit WWW.OLAMOSHSYSTEM.COM now to read the original article.

Phone number:08026652529
E-mail Address:olamosh.system009@gmail.com
Join me on facebook:www.facebook.com/olamoshsystem
Website address:-www.olamoshsystem.com or www.latestdreamjob.blogspot.com

Group name on facebook:Information Technology(OLAMOSH SYSTEM LTD)

Group name on facebook:(LATEST DREAM JOB)  

No Response to "Difference between Malware, Adware and Spyware"

Leave A Reply

SUBSCRIBE TO RECEIVE MY FUTURE ARTICLE THROUGH EMAIL

Enter your email address:

Delivered by FeedBurner

Latest ICT News
Ghana seeks ICT assistance from India
Three banks begin integration to national switch
Cyber fraud activities in Ghana peak at 1am daily – Report
Top BlackBerry Torch 9800 apps
Nigeria Ranked 2nd Highest Country in Software Piracy
GTBank Rolls Out FX Fund Transfer, Opens e-Branches
Glo Ranked Among Africa’s 10 Most Valuable Brands
Airtel Nigeria launches new BlackBerry packages
YouTube in Nigeria –YouTube.com.ng
Google Scholarships for 2012
HiTV Offers Dove and TVC Free
Etisalat Unveil ‘9ja Free Credit’ SIM promotion
Airtel Launches 15k Per Second Plan
Airtel launches new global brand across its operations in Africa
Airtel Nigeria defends name change
Airtel slashes call rates in Nigeria
Nigeria, China sign pact to replace faulty satellite by 2011
Visafone, Etisalat Battle to Acquire Multi-Links
Etisalat Chairman- Industry should emulate music industry
Etisalat Users to Retrieve Lost SIM Cards Online
Online Money Making Tips
How To Make Over N183,000 On a Monthly Basis Doing Just Four(4) Legitimate Biz
Affiliate Blogging
Buy a Very Cheap Tokunbo Laptop & Desktop Cumputer
Great Cheap Browsing for Just N1000 Per Month
Home-Based Business You Can Start Immediately with Low Capital
Hot Business! Real Income!! Hot Opportunity!!!
How to Cash Your Google & International Check in Nigerian Banks
How to Make Money From Your Website
How To Register Business Name in Nigeria
How to Start a Blog and Make Money
How to Use Blogging to Build Your Email Marketing
Make Money Online Schemes Nigerians Should Avoid
What Sort of Website Should I Create In Order to Earn Money?
What You Need To Start & Run a Successful Business in Nigeria
Why Small Business Fail
Blogging Tips
10 Essential Tips for Getting Targeted Traffic to Your Blog
10 Practical Ideas to Drive Traffic to Your Blog
15 Tips for Blog Block
3 Proven Tips to For Creating an Extremely Successful & Profitable Blog
5 Tips for Effective Blogging
Blogging Through Social Media Websites
Blogging Tips for Beginners
Blogging Vs Journalism
How to Make Your First Sale on the Internet the Easy Way
How to Use Blogging to Build Your Email Marketing
How to Use RSS to Generate Tons of Traffic to Your Blog
Some Basic Usability Tips for Commercial Websites
Tips on Choosing a Good Domain Name
What Does Blog Stand For
Wordpress vs Blogger
Admission/Scholarship Info
Abia Poly Wins Ispon Competition
NNPC/CHEVRON 2011/2012 Scholarship Award
Uniport 2011/2012 Merit Admission List Released
Adekunle Ajasin University 2011/2012 Admission Status, Released
FUPRE 2011/2012 Post UTME Results is out
EBSU 2011/2012 Merit Admission List, Now Online
Uniben Direct Entry Screening Exercise for 2011/2012 Academic Session
University of Benin Uniben Releases 2011/2012 Post Utme Results & Admission List
Delsu Releases 2011/2012 Post Utme Cut-Off Marks
Tai Solarin Univeristy of Education Releases 2011/2012 2nd Batch Admission List
UNN Begins Payment of 2011/2012 Acceptance Fees
OAU 2011/2012 Pre-Degree Entrance Examination Date and Time
FUTA 2011/2012 Admission in Pre-Degree and Diploma Programmes Now Available.
Polytechnic Ibadan Releases 2011/2012 Admission List
TASUED Releases 1st batch Admission List

TWITTER UPDATES

Infolinks In Text Ads

 
Twitter Bird Gadget