home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
PC World 2004 April
/
PCWorld_2004-04_cd.bin
/
software
/
vyzkuste
/
spysweeper
/
ssfsetup1_9199452.exe
/
file_id.diz
< prev
next >
Wrap
Text File
|
2003-03-10
|
3KB
|
61 lines
-------------------------------------------
Spy Sweeper v1
(c) 1998-2003 Webroot Software, Inc.
http://www.webroot.com/
saleshelp@webroot.com
-------------------------------------------
Works with Windows 98, ME, 2000, XP Pro and XP Home.
Note: Before scanning, to ensure proper removal of spyware,
be sure to close any other applications that are running
on your system.
Description:
Webroot Spy Sweeper is capable of identifying and eliminating certain
programs designed to collect information about you through your
computer use.
Spyware is loosely defined as any program that covertly gathers
information through your Internet connection without your knowledge.
Once installed, spyware programs monitor user activity on the Internet
and transmit that information to interested parties.
In addition to wasting bandwidth, certain spyware programs can gather
information about email addresses, keystrokes, cookies, and
even passwords and credit card numbers. Many Spyware programs have been
known to cause system failure and general system instability.
Spyware types detected by Webroot Spy Sweeper
Adware:
Adware is software designed to track your buying and surfing habits,
as well as demographic information and, sometimes, personal information.
Sometimes classified as spyware, Adware may be installed on your computer
when you install a shareware or freeware utility. Once an adware program
is running on your system, it can track your activities and subsequently
transmit reports to a remote computer for advertising purposes.
System Monitor Software:
System monitoring software is software placed on your system, either
locally or remotely, for the sole purpose of collecting information
on all of your computer activities. System monitoring software is
used by employers, identity thieves, private investigators and many
others to gather information ranging from keystrokes, to the programs
you run, to web sites you visit.
Almost all system monitoring software can run in stealth mode, allowing
it to be placed on your system and used without your knowledge.
Trojan Horses:
Trojan Horses or Trojans are malicious programs that masquerade as helpful
applications. Once installed, they collect and transmit information about
you. Hackers and identity thieves use Trojans to steal login names, passwords,
and credit card information. A popular method of transmitting Trojans is to
disguise them as a "music file" on an Internet site, waiting for someone to
download and activate it. They are also frequently disguised as an update to
Windows, or even as an update to anti-virus software. Many defense measures,
such as anti-virus programs and firewalls, do not detect Trojans.