How Does A Malicious Spyware Program Work?

What is spyware? Spyware is software or a program that observes a person’s computer activities stealthily and then transmits that information over the Internet to the company or person who installed the spyware.
It monitors the computer activities of the user. It shows you banner ads that is based on what sites you surf. Most spyware is bundled in free software that you download from the Internet.
You can detect spyware online using free spyware cleaners and by installing spyware protection software on your computer. Often it's best to start with free spyware cleaners because these free spyware removal tools will remove any spyware programs currently running on your computer.
Where Does Spywares Come From?
Where to spyware come from and how spywares work? Clever programmers author Spywares and they delivered to user’s computers through covert Internet installs. Spyware is all over the Internet in forms of Adware download, Trojan Horses and Browser Hijackers. From many different places you can get a spyware. Cute free Christmas screen saver maybe a potential Spyware or A song you download using downloader may contain Spyware. Subscribing to free online services or install new pop-ups or software without reading End User License Agreement (EULA) will install spywares on your computer. Spywares can install in your computer as cookies when you connect to a site. They send all information about your activities.
Types of Spywares
The spywares are of different forms. The types of spywares are as follows:

Password and Information Stealers
Banking and Backdoor Trojans
Botnet Warms

The working of each and every type of Spywares will be explained.
Password and Information Stealers

It steals passwords and other sensitive personal information. They do not contain any methods to replicate. They downloaded from some websites as Trojans and it is installed on the user’s system. It may contain a attractive message to make the user click. After installing it will run on user system and transmit the user’s password and other information to the remote places /people.
Keyloggers monitor the user’s keystrokes with the intention of stealing password and other personal identity information. They can also record video or audio and transmit what they are capturing over your Internet connection. Keyloggers run as invisible process and it can capture snap shots, mouse activities, keystrokes even when a user is logged off. Remote Keyloggers record every keystroke in a computer and send it via email. The Log-file includes the title of the application that typed in and the date and time while typing. You can remove Keyloggers by installing anti-virus packages and installation of firewalls.


Post a Comment

Recommend us on Google!


Twitter Delicious Facebook Digg Stumbleupon Favorites More