wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Spyware

profile
Harsha panchal
Aug 26, 2022
0 Likes
0 Discussions
90 Reads

Spyware (a portmanteau for spying software) is software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their privacy or endangering their device's security. This behavior may be present in malware as well as in legitimate software. Websites may engage in spyware behaviors like web tracking. Hardware devices may also be affected.Spyware is frequently associated with advertising and involves many of the same issues. Because these behaviors are so common, and can have non-harmful uses, providing a precise definition of spyware is a difficult task.

History:-The first recorded use of the term spyware occurred on October 16, 1995 in a Usenet post that poked fun at Microsoft's business model. Spyware at first denoted software meant for espionage purposes. However, in early 2000 the founder of Zone Labs, Gregor Freund, used the term in a press release for the ZoneAlarm Personal Firewall. Later in 2000, a parent using ZoneAlarm was alerted to the fact that "Reader Rabbit," educational software marketed to children by the Mattel toy company, was surreptitiously sending data back to Mattel.

Since then, "spyware" has taken on its present sense.

Spyware is mostly classified into four types: adware, system monitors, tracking including web tracking, and trojans;examples of other notorious types include digital rights management capabilities that "phone home", keyloggers, rootkits, and web beacons. These four categories are not mutually exclusive and they have similar tactics in attacking networks and devices. The main goal is to install, hack into the network, avoid being detected, and safely remove themselves from the network.

Spyware is mostly used for the stealing information and storing Internet users' movements on the Web and serving up pop-up ads to Internet users. Whenever spyware is used for malicious purposes, its presence is typically hidden from the user and can be difficult to detect. Some spyware, such as keyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users.


Comments ()


Sign in

Read Next

Spotify

Blog banner

Different memory allocation strategies

Blog banner

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

Critical success factors

Blog banner

Big Data Architecture

Blog banner

Caching windows

Blog banner

Self-love: Being the reason of your own smile

Blog banner

objectives and functions of operating system

Blog banner

PROCESS STATES OF OPERATING SYSTEM

Blog banner

SESSION HIJACKING

Blog banner

Processes : Process description and control

Blog banner

Deadlock in operating system

Blog banner

File Organization and Access

Blog banner

Article on Zoho Corporation

Blog banner

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

Blog banner

Safeguarding Your Data: The Importance of Wireless Encryption

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

E-mail security

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

Deadlock and Starvation

Blog banner

FREE VERSION OF G-MAIL

Blog banner

EFT

Blog banner

KAHAWA TEA

Blog banner

Starvation

Blog banner

The Features of Blockchain

Blog banner

RAID

Blog banner

R Programming

Blog banner

What is Network Security?

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

Wrike

Blog banner

WHAT IS TWITTER AND HOW DOES IT WORK

Blog banner

What are NFT s?

Blog banner

Deadlock

Blog banner

Why Soft Skills Matter as Much as Grades?

Blog banner

Depression

Blog banner

Memory Partitioning

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

Memory Management in an Operating System

Blog banner

FIREWALL

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner

How to feel Happy everyday day

Blog banner