Friday, October 25, 2019
Spyware Essay -- Spyware Research Papers
Spyware       I. Introduction    Slowly but surely, the computer I use at home was getting slower and slower.  Whenever I would connect to the Internet, simple tasks such as web browsing and checking e-mail would take longer amounts of time to complete than usual.  Although my 56K modem was slow by todayââ¬â¢s standards, I knew that it would not bottleneck the system while opening simple web sites such as Google.  This was a shock to me since I pride myself on running a streamlined and clean computer.  It was even more puzzling since the only continuously running program I allow is an Anti-Virus program.  I checked the Windows Task Manager and to my surprise, my CPU usage was hovering around 80%, yet no other programs were running!  I immediately started researching the problem on the Internet and quickly found the problem that matched my computerââ¬â¢s symptoms, spyware.  I downloaded a spyware detection and removal utility; fortunately my problem was resolved.  It detected three unique spyware programs runni   ng on my computer and quickly removed them.  My computer returned to normal operating speed and I felt safe knowing no more spyware was on my computer.    II. What is Spyware?    Spyware is the general term for ââ¬Å"describing software whose purpose is to collect demographic and usage information from your computer, usually for advertising purposes.  The term is also used to describe software that ââ¬Ësneaksââ¬â¢ onto the system or performs other activities hidden to the user.â⬠1 Basically, spyware is a program that runs in the background of a computer, unbeknownst to the user, that has multiple abilities.  The most non-intrusive task is using spyware as a form of copy protection.  Intuit, the company that produces the popular tax program TurboT...              ...eve Gibson, ââ¬Å"The Anatomy of File Download Spyware,â⬠ Gibson Research Corporation,  (4 March 2003).    6. Jason Anders, ââ¬Å"Net Filter Spies on Kidsââ¬â¢ Surfing,â⬠ Wall Street Journal, 25 January 2001, 1.    7. Jason Anders, ââ¬Å"Net Filter Spies on Kidsââ¬â¢ Surfing,â⬠ Wall Street Journal, 25 January 2001, 2.    8. George Lawton, ââ¬Å"Invasive Software: Whoââ¬â¢s Inside Your Computer?â⬠ Computer, July   2002, 15.    9. John Borland and Rachel Konrad, ââ¬Å"PC Invaders Camp Out in Hard Drives,â⬠ Cnet News, 18 April 2002,  (4 March 2003).    10. Ed Foster, ââ¬Å"Sneakwrapping a Virus,â⬠ Infoworld, 4 November 2002, 64.    11. Staff Writer, ââ¬Å"Sen. Edwards Introââ¬â¢s ââ¬ËSpyware Control Act,ââ¬â¢Ã¢â¬  Financial Times, 9 October 2000, 1.    12. Staff Writer, ââ¬Å"Sen. Edwards Introââ¬â¢s ââ¬ËSpyware Control Act,ââ¬â¢Ã¢â¬  Financial Times, 9 October 2000, 1.                        
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.