Key Logger -
Dangerous |
A type of software can be
either secretly installed on your PC by someone who has access to your
computer or may be installed inadvertently via the Internet. This
software can allow people to monitor your keystrokes, your computer
screen, chat conversations, to steal your passwords, credit card info,
banking, identity, etc,... and can even allow remote access.
EXTREMELY DANGEROUS! |
|
Dialer -
Very Costly |
A program that usually
configures some sort of dial up configuration such as a
dial-up-networking connection in Windows. The user either knowingly or
unknowingly will end up using the dialer that calls a time-charged
number that is usually billed to your credit card. It can be
very costly because some hackers will make you call international
phone numbers where they can charge you per minute without you knowing
it. |
|
Browser Hijacker |
A type of software that
changes your browser settings, which most commonly includes your home
page without you knowing. |
|
Cookie |
Cookies are small files
that are created by your web browser when you visit sites on the
Internet. They can be used to track your visits to certain web sites
and can provide companies with information about frequency of visits
and other profile information. The user is usually not aware that
their surfing habits are being tracked. |
|
AdWare -
Very Annoying |
Adware is a type of
software that displays advertisements on the computer screen while a
computer is running. Typically, Adware is built into software that
performs some other primary task such as file sharing. Popup
Blockers are usually useless when it comes to Adware. |
|
Parasite -
Dangerous |
A type of software that
piggybacks onto other software. This type of software commonly
installs without the users knowledge or consent. |
|
Trackware -
Spies on you |
Trackware is a generic
term that describes software that collects a computers demographic and
usage information and sends it to some remote server via the Internet,
where it can be used by other people in a variety of different ways
including marketing. |
|
Trojan -
Very Dangerous |
A type of software that is
installed unknowingly, usually as a result of installing some other
software, or viewing an e-mail. Since it exists as a software program
on the computer, the range of activity of a Trojan can be quite broad,
from usage monitoring to remote control to customized collection and
theft of information. |
|
Worm -
Slows down PC |
Software that propagates
by creating duplicates of itself on other computers
|