AdamTheTech Logo
AdamTheTech
Enthusiast of Technology, Web Development, and Sci-Fi

Microsoft’s Free Virtual Machine Images

Deus Ex: Human Revolution Review

Embed dll Files Within an exe (C# WinForms)

Your Guide to Spyware

Please be aware that this entry is over two years old. Therefore, it may contain broken links, outdated information, or views and content which are no longer completely valid.

Other Terms To Know

These are terms that aren’t directly related to spyware, but have been mentioned briefly and will be mentioned later on. They’re good to know within the general scheme of things, for general awareness.

ActiveX Pop-up – This contains an ActiveX Control, which is most often downloaded and executed through a web browser, and can have full reign over Windows Operating Systems. Because ActiveX Controls have such free access in Windows systems, there is a huge risk that the software being installed can be almost any form of spyware or malware.

Browser Cache – This is where all temporary webpage data is stored. All files that are downloaded within your browser end up here, which can include: html, php, cgi, jpg, gif, bmp, png, wma, txt, etc.

DoS Attack – (Denial of Service Attack) An attack on a computer system or network that overloads all available resources, which causes a loss of network connectivity by consuming all available bandwidth, or an overload of computational resources in a computer system (flooding the RAM, maxing out the CPU, or filling the hard drive), which often leads to lockups and freezes.

DDoS Attack – (Distributed Denial of Service Attack) This attack is very similar to a regular DoS attack, but in this case, the attack is made from multiple sources; usually from zombie computers.

JVM – (Java Virtual Machine) A cross-platform execution environment. It allows programming, program execution and computer connectivity compatibility between Operating System platforms by means of a virtual machine (computer).

MAC Address – (Media Access Control address) This is a unique identification address used in hardware that connects to a network (ie, a modem or Ethernet card).

msconfig – (Microsoft System Configuration Utility) This utility handles startup tasks. Most often when it is referenced, it implies that the user should look at the “Startup” tab. To access it, simply go to Start > Run, type msconfig and hit enter. This utility is not included on Windows 2000 systems, so it will have to be manually installed.

Phishing – Put simply, they are fraudulent acts committed online. It is an attempt to get a user to reveal their passwords, credit card information, or any other personal information via deceptive practices (usually by email).

UI – (User Interface) This can be text based or graphical based. GUI (Graphical User Interface) is the term most people are familiar with seeing.

Virus – Similar to a worm, but needs to be inserted into a file or program in order to execute and propagate. They are not self-contained.

Warez – Illegal/pirated software; software that has been distributed freely without being paid for and/or does not have a valid individual software license.

Zombie Computer – a computer with an Internet connection (most often broadband) that has one or many hidden software programs or backdoors that have been installed by a third party. This software can allow the computer to be remotely controlled. Zombie uses include conducting DDoS attacks, email spamming, warez file hosting and malware distribution. This can all be accomplished while not revealing the attacker’s true identity and laying blame on the computer’s owner. This can sometimes lead to an ISP shutting down the Internet connection and/or blacklisting the connection or MAC address.