
cyber crime such as the following :
Spyware
In accordance with its name, which means spy and spy ware, which means the program, the spyware who fall into these categories of malicious software, was created in order to spy on the computers we use. Of course, in accordance with the character and nature of a spy, it was all done without the knowledge of the owner. After obtaining the data from the monitoring results, the spyware will be reported activities that occur on the PC to a third party or the maker of spyware.
Spyware was originally not dangerous because it does not damage data as well as by a virus. Unlike a virus or worm, spyware do not breed and does not spread itself to other PCs in the same network. However, in line with developments in technology and sophistication of human reason, which was originally only tangible spyware or banner ads with a view to a profit per se, now turned into one of the media are damaging, even tends to be detrimental.
Based on the type of disruption ditimbulkannnya, it appeared the names of this type of spyware. Here are some names of spyware.
Adware
This program is usually a form of advertising which is inserted in secret by programmers and appear suddenly. Typically programs are free, but the user should receive compensation for ads on the program.
Browser Helper Object
Browser Helper Object (BHO) is a hijacker that displays a link on the toolbar. Generally BHO spy activities to record the activities netter, in addition to the browser view us, add a special toolbar.
Browser hijackers
Our browser forcibly inserted into a particular link and forcing us to go on a particular site even though we have correctly typed the site's domain address we are headed. This means that the browser program that we use has been indirectly hijacked and redirected to a specific site.
Dialer
Works include an automatic function for the Internet connection. Although we do not make an internet connection, secretly own the program can be active. The impact could result in material losses as a phone bill that had suddenly swollen.
Drive-by downloads
Automatically install a program without knowledge of the owner of the computer. This usually exploit the weaknesses in old versions of internet explorer.
Homepage hijacking
This is most often committed by malware authors. By changing the default browser homepage address and can not be changed even though we've been doing re sets.
Keylogger
Through a program that is accessed, the keylogger to record what we type and send data to the server malware authors. This program can be detrimental if the necessary data that we possess or store in kompter can be known.
Search hijackers
The control is carried out a search engine on the browser. When one writes an address, the program usually displays so many pop up ads that are not known.
Surveillance software
One program that is harmful to the way record activities on a computer, including critical data, passwords, and others. The program is very smart and only send data after a user completes an activity.
Thiefware
Functioned to direct visitors to the site to other sites that they want.
Spyware
In accordance with its name, which means spy and spy ware, which means the program, the spyware who fall into these categories of malicious software, was created in order to spy on the computers we use. Of course, in accordance with the character and nature of a spy, it was all done without the knowledge of the owner. After obtaining the data from the monitoring results, the spyware will be reported activities that occur on the PC to a third party or the maker of spyware.
Spyware was originally not dangerous because it does not damage data as well as by a virus. Unlike a virus or worm, spyware do not breed and does not spread itself to other PCs in the same network. However, in line with developments in technology and sophistication of human reason, which was originally only tangible spyware or banner ads with a view to a profit per se, now turned into one of the media are damaging, even tends to be detrimental.
Based on the type of disruption ditimbulkannnya, it appeared the names of this type of spyware. Here are some names of spyware.
Adware
This program is usually a form of advertising which is inserted in secret by programmers and appear suddenly. Typically programs are free, but the user should receive compensation for ads on the program.
Browser Helper Object
Browser Helper Object (BHO) is a hijacker that displays a link on the toolbar. Generally BHO spy activities to record the activities netter, in addition to the browser view us, add a special toolbar.
Browser hijackers
Our browser forcibly inserted into a particular link and forcing us to go on a particular site even though we have correctly typed the site's domain address we are headed. This means that the browser program that we use has been indirectly hijacked and redirected to a specific site.
Dialer
Works include an automatic function for the Internet connection. Although we do not make an internet connection, secretly own the program can be active. The impact could result in material losses as a phone bill that had suddenly swollen.
Drive-by downloads
Automatically install a program without knowledge of the owner of the computer. This usually exploit the weaknesses in old versions of internet explorer.
Homepage hijacking
This is most often committed by malware authors. By changing the default browser homepage address and can not be changed even though we've been doing re sets.
Keylogger
Through a program that is accessed, the keylogger to record what we type and send data to the server malware authors. This program can be detrimental if the necessary data that we possess or store in kompter can be known.
Search hijackers
The control is carried out a search engine on the browser. When one writes an address, the program usually displays so many pop up ads that are not known.
Surveillance software
One program that is harmful to the way record activities on a computer, including critical data, passwords, and others. The program is very smart and only send data after a user completes an activity.
Thiefware
Functioned to direct visitors to the site to other sites that they want.
0 Komentar
Harap jangan berkomentar yang bersifat spam, yang berbau sara, kata-kata kotor, atau yang bersifat nada keras atau komentar Anda akan kami HAPUS.