|
||||||||||||||||||||
Tech: spyware-etc..how it happens -what to do
|
Share Thread
|
Subject: RE: Tech: spyware-etc..how it happens -what to do From: Cattail Date: 12 Apr 04 - 01:24 PM Many thanks for this Bill D, any help to understand and get rid of this crap is much appreciated. Cheers for now Cattail ! |
Subject: RE: Tech: spyware-etc..how it happens -what to do From: michaelr Date: 12 Apr 04 - 01:17 PM Here's a link I found in the Google ads at the bottom of the page: Compare Spyware Removers. Is anyone familiar with these programs? |
Subject: RE: Tech: spyware-etc..how it happens -what to do From: michaelr Date: 12 Apr 04 - 01:12 PM Thank you, thank you, thank you, Bill D, for the links to Eric Howes' work. I have now a much better understanding of crapware, how it gets installed, and what it does to my PC. Interestingly, I have some of the same problems he encountered during his test, and recognize the lyrics site and some of the toolbars that appeared on his system. Thanks again, this is very helpful. Cheers, Michael |
Subject: RE: Tech: spyware-etc..how it happens -what to do From: John MacKenzie Date: 12 Apr 04 - 12:47 PM I use Spy Hunter, as I am not impressed by people spying on my computer habits, it is in its way, worse then spam. John |
Subject: RE: Tech: spyware-etc..how it happens -what to do From: Duane D. Date: 12 Apr 04 - 12:44 PM We've had problems galore at work from unwanted spyware invading our computers and the only completely successful free removal software we've been able to fully use is Spy Sweeper. We have free downloads of Spybot and Adaware, but were only able to partially remove the unwanted garbage. Something else to be aware of, if you are on a LAN and one user on one node has Kaza installed, your whole network is accessable to outsiders. |
Subject: Tech: spyware-etc..how it happens -what to do From: Bill D Date: 12 Apr 04 - 12:09 PM if it has ever happend to you, or if you are just nervous reading horror stories by others---here is the straight dope about spyware..read as much as you can understand and have patience for. There is information about what CAN happen, how tricky it is to fight, and what can be done, including prevention. One of the major points is that protection is made much easier if you do not use the IE browser, as "Active-X" controls are one of the major ways this crap gets installed. (The 3rd item is the most 'interesting' perhaps, but is also the longest--if you don't read it in detail, scan it for the salient points) Comments to the FTC Junkware: A New Name for Spyware (21 kb) The Anatomy of a Drive-by-Download (952 kb) |
Share Thread: |
Subject: | Help |
From: | |
Preview Automatic Linebreaks Make a link ("blue clicky") |