Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Special pages
Niidae Wiki
Search
Search
Appearance
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
Spyware
(section)
Page
Discussion
English
Read
Edit
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
View history
General
What links here
Related changes
Page information
Appearance
move to sidebar
hide
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Security practices=== To detect spyware, computer users have found several practices useful in addition to installing anti-spyware programs. Many users have installed a [[web browser]] other than [[Internet Explorer]], such as [[Mozilla Firefox]] or [[Google Chrome]]. Though no browser is completely safe, Internet Explorer was once at a greater risk for spyware infection due to its large user base as well as vulnerabilities such as [[ActiveX]] but these three major browsers are now close to equivalent when it comes to security.<ref>Stefan Frei, Thomas Duebendofer, Gunter Ollman, and Martin May, [http://www.codeengn.com/archive/Conference/Defcon/16/Understanding%20the%20Web%20browser%20threat%5Bfrei-panel%5D.pdf Understanding the Web browser threat: Examination of vulnerable online Web browser populations and the insecurity iceberg] {{Webarchive|url=https://web.archive.org/web/20160911181857/http://www.codeengn.com/archive/Conference/Defcon/16/Understanding%20the%20Web%20browser%20threat%5Bfrei-panel%5D.pdf |date=September 11, 2016 }}, Communication Systems Group, 2008</ref><ref>{{cite journal|title= Security Busters: Web Browser security vs. rogue sites|journal= Computers & Security|volume= 52|pages= 90–105|doi= 10.1016/j.cose.2015.04.009|year= 2015|last1= Virvilis|first1= Nikos|last2= Mylonas|first2= Alexios|last3= Tsalis|first3= Nikolaos|last4= Gritzalis|first4= Dimitris}}</ref> Some [[Internet service provider|ISP]]s—particularly colleges and universities—have taken a different approach to blocking spyware: they use their network [[Firewall (networking)|firewall]]s and [[web proxy|web proxies]] to block access to Web sites known to install spyware. On March 31, 2005, [[Cornell University]]'s Information Technology department released a report detailing the behavior of one particular piece of proxy-based spyware, ''[[Marketscore]]'', and the steps the university took to intercept it.<ref>Schuster, Steve. "{{cite web |url=http://www.cit.cornell.edu/computer/security/marketscore/MarketScore_rev2.html |title= Blocking Marketscore: Why Cornell Did It |archive-url=https://web.archive.org/web/20070214111921/http://www.cit.cornell.edu/computer/security/marketscore/MarketScore_rev2.html |archive-date=February 14, 2007}}". Cornell University, Office of Information Technologies. March 31, 2005.</ref> Many other educational institutions have taken similar steps. Individual users can also install [[Personal firewall|firewalls]] from a variety of companies. These monitor the flow of information going to and from a networked computer and provide protection against spyware and malware. Some users install a large [[hosts file]] which prevents the user's computer from connecting to known spyware-related web addresses. Spyware may get installed via certain [[shareware]] programs offered for download. Downloading programs only from reputable sources can provide some protection from this source of attack.<ref name=AAA>{{cite news|url=http://www.spywareloop.com/news/spyware |title=Information About Spyware in SpyWareLoop.com |author=Vincentas |newspaper=Spyware Loop |date=July 11, 2013 |access-date=July 27, 2013 |url-status=dead|archive-url=https://web.archive.org/web/20131103215947/http://www.spywareloop.com/news/spyware |archive-date=November 3, 2013 }}</ref> Individual users can use cellphone / computer with physical (electric) switch, or isolated electronic switch that disconnects microphone, camera without bypass and keep it in disconnected position where not in use, that limits information that spyware can collect. (Policy recommended by NIST Guidelines for Managing the Security of Mobile Devices, 2013).
Summary:
Please note that all contributions to Niidae Wiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Encyclopedia:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Search
Search
Editing
Spyware
(section)
Add topic