if (ParamKey == unescape("Spy_Sweeper_Scan_Help-5-1.html#wp470370")) VarHTML = "<a name=\"wp470370\"> </a><div class=\"pPopup\">\u000d\u000atraces\u000d\u000a</div>\u000d\u000a<a name=\"wp470375\"> </a><div class=\"pPopupAppend\">\u000d\u000aTraces are places where Spy Sweeper finds spyware fingerprints. Traces can be a file, cookie, or registry entry. Each definition is made up of multiple traces.\u000d\u000a</div>\u000d\u000a";
if (ParamKey == unescape("Spy_Sweeper_Scan_Help-5-1.html#wp470321")) VarHTML = "<a name=\"wp470321\"> </a><div class=\"pPopup\">\u000d\u000aadware\u000d\u000a</div>\u000d\u000a<a name=\"wp471253\"> </a><div class=\"pPopupAppend\">\u000d\u000aAdware is advertising-supported software that displays advertisements. Adware is usually available via free downloads from the Internet. Adware is often bundled with or embedded within freeware programs like filesharing applications, search utilities, information-providing programs (such as clocks, messengers, alerts, weather, and so on), and software such as screensavers, cartoon cursors, backgrounds, sounds, etc. Deleting adware may result in the deletion of the bundled freeware application.\u000d\u000a</div>\u000d\u000a<a name=\"wp471254\"> </a><div class=\"pPopupAppend\">\u000d\u000aWorst case scenario: Although seemingly harmless, some adware programs may track your Web surfing habits and cause slowing of your Web browser as well as system performance issues.\u000d\u000a</div>\u000d\u000a";
if (ParamKey == unescape("Spy_Sweeper_Scan_Help-5-1.html#wp471491")) VarHTML = "<a name=\"wp471491\"> </a><div class=\"pPopup\">\u000d\u000aBrowser Helper Object (BHO)\u000d\u000a</div>\u000d\u000a<a name=\"wp471493\"> </a><div class=\"pPopupAppend\">\u000d\u000aBrowser Helper Objects are add-on programs that work with your browser. Some spyware adds BHOs without your knowledge. \u000d\u000a</div>\u000d\u000a";
if (ParamKey == unescape("Spy_Sweeper_Scan_Help-5-1.html#wp471441")) VarHTML = "<a name=\"wp471441\"> </a><div class=\"pPopup\">\u000d\u000arootkit or potentially rootkit masked files\u000d\u000a</div>\u000d\u000a<a name=\"wp471443\"> </a><div class=\"pPopupAppend\">\u000d\u000aRootkits are software tools that an attacker uses to maintain access to your computer for malicious purposes.\u000d\u000a</div>\u000d\u000a";
if (ParamKey == unescape("Spy_Sweeper_Scan_Help-5-1.html#wp470383")) VarHTML = "<a name=\"wp470383\"> </a><div class=\"pPopup\">\u000d\u000aTrojan horses\u000d\u000a</div>\u000d\u000a<a name=\"wp470385\"> </a><div class=\"pPopupAppend\">\u000d\u000aA Trojan horse is a program that allows a hacker to make changes to your computer. Unlike a virus, a Trojan does not replicate itself. It is generally disguised as a harmless software program and distributed as an e-mail attachment. Once you open the attachment, the Trojan may install itself on your computer without your knowledge or consent. It has the ability to manage files on your computer, including creating, deleting, renaming, viewing, or transferring files to or from your computer. It may utilize a program manager that allows a hacker to install, execute, open, or close software programs. Trojans have the ability to run in the background, hiding their presence.\u000d\u000a</div>\u000d\u000a";
if (ParamKey == unescape("Spy_Sweeper_Scan_Help-5-1.html#wp470364")) VarHTML = "<a name=\"wp470364\"> </a><div class=\"pPopup\">\u000d\u000asystem monitors\u000d\u000a</div>\u000d\u000a<a name=\"wp471273\"> </a><div class=\"pPopupAppend\">\u000d\u000aSystem monitors may monitor all of your computer activity. They range in capabilities and may record some or all of the following: keystrokes, e-mails, chat room conversations, instant messages, Web sites visited, programs run, time spent, and even usernames and passwords. The information is gathered via remote access or sent by e-mail, and may then be stored for later retrieval. \u000d\u000a</div>\u000d\u000a<a name=\"wp471274\"> </a><div class=\"pPopupAppend\">\u000d\u000aWorst case scenario: A third party may be able to view your personal conversations and may gain access to private information such as your usernames, passwords, credit card numbers, or your Social Security number. \u000d\u000a</div>\u000d\u000a";
if (ParamKey == unescape("Spy_Sweeper_Scan_Help-5-1.html#wp471295")) VarHTML = "<a name=\"wp471295\"> </a><div class=\"pPopup\">\u000d\u000akeylogger\u000d\u000a</div>\u000d\u000a<a name=\"wp471299\"> </a><div class=\"pPopupAppend\">\u000d\u000aA keylogger is a type of system monitor that may record all keystrokes on your computer. Therefore, a keylogger may record and log your e-mail conversations, chat room conversations, instant messages, and any other typed material. They have the ability to run in the background, hiding their presence. Keyloggers may be installed by someone with administrative access to your computer or they may be installed via other threats, such as music downloads and Trojan downloaders.\u000d\u000a</div>\u000d\u000a<a name=\"wp471300\"> </a><div class=\"pPopupAppend\">\u000d\u000aWorst case scenario: A third party may be able to view your personal conversations and may gain access to private information such as your usernames, passwords, credit card numbers, or your Social Security number.\u000d\u000a</div>\u000d\u000a";
if (ParamKey == unescape("Spy_Sweeper_Scan_Help-5-1.html#wp470326")) VarHTML = "<a name=\"wp470326\"> </a><div class=\"pPopup\">\u000d\u000adefinitions\u000d\u000a</div>\u000d\u000a<a name=\"wp470328\"> </a><div class=\"pPopupAppend\">\u000d\u000aA definition is the set of fingerprints that characterize a piece of spyware. Webroot regularly updates the definitions of known spyware that Spy Sweeper uses.\u000d\u000a</div>\u000d\u000a";
if (ParamKey == unescape("Spy_Sweeper_Scan_Help-5-1.html#wp471487")) VarHTML = "<a name=\"wp471487\"> </a><div class=\"pPopup\">\u000d\u000aAlternate Data Stream (ADS) \u000d\u000a</div>\u000d\u000a<a name=\"wp471489\"> </a><div class=\"pPopupAppend\">\u000d\u000aAn Alternate Data Stream is a highly technical way to hide images, data, or code in a file and can be used to hide malicious code. The hidden content is impossible to detect using regularly-available tools, such as Windows Explorer.\u000d\u000a</div>\u000d\u000a";
if (ParamKey == unescape("Spy_Sweeper_Scan_Help-5-1.html#wp471337")) VarHTML = "<a name=\"wp471337\"> </a><div class=\"pPopup\">\u000d\u000adialer\u000d\u000a</div>\u000d\u000a<a name=\"wp471348\"> </a><div class=\"pPopupAppend\">\u000d\u000aDialers have the ability to disconnect your computer from your local Internet provider and reconnect you to the Internet using an expensive toll or international phone number. They do not spy on you, but they may accrue significant long distance phone charges. They have the ability to run in the background, hiding their presence.\u000d\u000a</div>\u000d\u000a<a name=\"wp471349\"> </a><div class=\"pPopupAppend\">\u000d\u000aWorst case scenario: Dialers may accrue significant long distance phone charges. \u000d\u000a</div>\u000d\u000a";
if (ParamKey == unescape("Spy_Sweeper_Scan_Help-5-1.html#wp470378")) VarHTML = "<a name=\"wp470378\"> </a><div class=\"pPopup\">\u000d\u000atracking cookies\u000d\u000a</div>\u000d\u000a<a name=\"wp471325\"> </a><div class=\"pPopupAppend\">\u000d\u000aCookies are pieces of information that are generated by a Web server and stored on your computer for future access. Cookies were originally implemented to allow you to customize your Web experience. However, some Web sites now issue tracking cookies, which allow multiple Web sites to store and access cookies that may contain personally identifiable information (surfing habits, usernames and passwords, areas of interest, etc.), and then simultaneously share the information with other Web sites. Tracking cookies are installed and accessed without your knowledge or consent.\u000d\u000a</div>\u000d\u000a<a name=\"wp471326\"> </a><div class=\"pPopupAppend\">\u000d\u000aWorst case scenario: This sharing of information allows marketing firms to create a user profile based on your personal information and sell it to other firms.\u000d\u000a</div>\u000d\u000a";
if (ParamKey == unescape("Spy_Sweeper_Scan_Help-5-1.html#wp471449")) VarHTML = "<a name=\"wp471449\"> </a><div class=\"pPopup\">\u000d\u000a<span style=\"font-style: normal; font-weight: bold; text-decoration: none; vertical-align: baseline\">ActiveX</span>\u000d\u000a</div>\u000d\u000a<a name=\"wp471536\"> </a><div class=\"pPopupAppend\">\u000d\u000aActiveX technology is a group of functions developed by Microsoft that let programs share information. Many legitimate programs use ActiveX, but some spyware also uses ActiveX to install itself.\u000d\u000a</div>\u000d\u000a";
if (ParamKey == unescape("Spy_Sweeper_Scan_Help-5-1.html#wp470359")) VarHTML = "<a name=\"wp470359\"> </a><div class=\"pPopup\">\u000d\u000aspyware\u000d\u000a</div>\u000d\u000a<a name=\"wp470361\"> </a><div class=\"pPopupAppend\">\u000d\u000aSpyware is any application that makes potentially unwanted changes to your computer while collecting information about your computing activities. This information may be sent subsequently to a third party for malicious purposes without your knowledge or consent. Spyware may arrive bundled with freeware or shareware, through e-mail or instant messenger, may propagate itself using dialog boxes, various social engineering methods, scripting errors, or by someone with access to your computer. Spyware is difficult to detect, and difficult (if not impossible) for the average user to remove.\u000d\u000a</div>\u000d\u000a";