Systweak Spyware Library
Systweak Spyware Library text
More than 21875 spyware signatures and growing
Microsoft Gold Certified Partner
Search in:
Spyware Glossary
Select Category
  Adtool

An Adtool is a program that comes bundled up with other adware or malware programs and attaches itself as a toolbar to the web browser. Once installed, it captures the keywords searched by the user and displays advertisements that might be annoying. The ads can include pop-ups, pop-unders, banners, or links etc. It may launch at system startup and alter the browser settings. This adware program can also result in slowing down of the computer thus interrupting the workflow. It is therefore recommended to remove such a program from the system.

Top   Adware

Adware is a type of software that implants/instills itself on to the user's computer and displays advertisements. The advertisements can take various forms such as pop-ups, pop-unders, banners and links that might be insidious for the user's machine. Adware are often allied with various freeware programs. It runs in the background of the freeware programs in order to display various advertisements that can annoy the user. It may also monitor the websites visited by the user and display ads accordingly. Having adware on a system may also result in system slowdown, therefore, it is recommended to remove such program.

Top   Adware Removal

Adware is a program prone to advertisements. By using an antispyware tool you can efficiently delete and remove all the infections downloaded to your system causing excessive popup display on your screen.

  Adware-Browser Add-In

A Browser Add-In is a program that attaches itself to the web browser and broadens the browser's functionality in order to make it work with various types of web content. It may install additional toolbars, marketing and search assistants; add several buttons, links or functions that facilitate pop-up blocking. It can also display advertisements such as pop-ups, pop-unders, banners and links that might be insidious for the user's machine. Such a program may pose security and privacy threats to the user and hence, it is advisable to remove the program as soon as it is detected.

Top
Useful Links :

Spyware Glossary 
Glossary showing categories of spywares for the users knowledge.

Spyware Articles 
Articles that could broaden your knowledge on Spyware.

Frequently Asked Questions 
Find answers on general user questions.

Comparison Chart 
Detailed Comparison with other market driven products.
Scan and Clean for free
  Anti-Adware

Anti-adware is a program that protects your computer from unknown adware attacks. It scans your system and removes adware, malware, spyware and other malicious entities from your computer. Generally these programs are undetected by firewall and antivirus programs.

Top   Anti-Trojan

Anti-trojan allow you to scan and protect trojans from entering your computer. A trojan remover program is an important utility that safeguards from all the malefactors around the world that can invariably harm your system.

Top   Anti-Dialer

Anti-dialer blocks the program that can access your phone line to dial high-cost calls without your knowledge and approved consent. Dialer is a program that connects to premium sites or websites displaying porn contents costing you hundreds of dollars in phone charges.

Top   Anti-Malware

Anti-malware is a solution to check all the malicious programs intruding your computer. It is a true protection guard against the deceiving applications that take the form of startup programs, cookies, registry entries, and files and folders to hide themselves in your system. It protects you from Spyware, Adware, Riskware, Key Loggers, Trojan and the like without using much of your systems resources.

Top   Antispyware/Antispyware Software

Antispyware ensures all-round protection of your computer. It tracks all kinds of spyware infections which can slow down system performance, steal confidential data, spy on your system, log your chat conversations and browsing habits, remotely control your computer, and spread self-replicating programs that propagate via security holes on your computer network.

Top   Antispyware Database

Antispyware database has all the key spyware signatures to protect your computer from all types of infections and threats.

Top   Antispyware For Windows

Antispyware ensures all-round protection of your computer. It tracks all kinds of spyware infections which can slow down system performance, steal confidential data, spy on your system, log your chat conversations and browsing habits, remotely control your computer, and spread self-replicating programs that propagate via security holes on your computer network. This program is compatible with all the versions of Windows operating system.

Top   Antispyware Review

Evaluation and test reports of an antispyware product based on the research by an authentic research agency.

Top   Backdoor

A Backdoor is a malevolent application that allows an attacker to perform illicit activities on a system thereby compromising with the system's security. After gaining access to the computer, the attacker can control it remotely without the user's consent and thus extract all the important information such as passwords and credit card numbers. It is therefore recommended to remove such kind of malicious programs from a system.

Top   Best Antispyware Software

The best antispyware software is one which has high spyware detection-rate, has built-in guards to track infections at real-time, uses low system resources and is at par in remaining feature-set with its competitors.

Top   Browser Helper Object

Browser Helper Object, also called as BHO, is basically a DLL module that loads every time Internet Explorer is launched. A BHO is installed by a third party program in the form of a toolbar to monitor searches and websites visited by a user and then redirects the browser request to predefined websites in order to display pop-up advertisements. A BHO may also routinely conflict with other running programs, causing a variety of page faults and run time errors that might hamper the browser's performance. Hence, it is recommended to remove such a threat from one's system.

Top   Browser Hijacker/Hijackware

Hijackware is a malicious program that alters the web browser settings without user's permission. It substitutes the Internet browser home page, error page, or search page set by the hijacker. This is usually done in order to artificially escalate traffic to a particular site, expose the user to adware, or for other despicable purposes and even to slowdown the speed of the system. Hijackware is classified as a security and privacy risk and it is hence recommended to remove this program from your system.

Top   Browser Modifier

A Browser Modifier is a web browser application that alters browser settings such as home page, search page, error page etc. without adequate consent of the user. This type of adware is installed on to the user's system through exploits and redirects search traffic. It can even add superfluous links to the favorites list and act as a medium to download browser hijackers. A browser modifier may result in slowing down the speed of the browser and can lead to unnecessary annoyance to the user. It is therefore recommended to remove such a program from the system.

Top   Bundled Applications

Bundled Applications are basically downloadable programs that install other adware or malware programs on to a machine without the user's consent. This application attracts the users by offering free downloadable wallpapers or games. Once installed, this application displays numerous advertisements on user's PC that might be annoying. The advertisements can be in various forms including pop-ups, pop-unders, banners etc. This program may also trace down the user's browsing activities, change browser's homepage settings, may hijack search results and hence should be removed from the system.

Top   Carding

Carding is a set of instructions that is written to perpetrate credit card fraud. The hacker receives information about the credit card via Spyware parasites that make identity thefts and is capable of tracking user's credit card numbers while online shopping. It may also be used to generate credit card numbers for fraudulent purchases, test numbers for legitimacy, or otherwise try to circumvent credit card security systems.

Top   Clicker Trojan

A Clicker Trojan is a program that acts as a channel for Trojans and Worms to install itself on a system. It is stealthily installed on the system, may also redirect the users to perilous or targeted websites in order to increase the hit counts of a site, for advertising purposes and even to organize a DoS or DDoS attack. The Trojan performs these activities either by distributing commands to the browser or by reinstating files that include URLs of the 'hosts' file in Windows. It may also modify certain registries and can even open up an enormous security hole on a system. Hence, it is recommended to remove this program in order to protect the security of a computer.

Top   Cookie

Cookie is a small data-tag that stores information about user's interaction with particular website. It can be used to track user's browsing behavior, count unique visitors to webpage, websites/features you regularly visit etc. This data is collected and passed on to advertising networks that uses the information to serve the user with unwanted ads etc. Thus such a cookie can present security and privacy threat to the user.

Top   Cracking Tool

A Cracking tool is software that is intended to alter other softwares in order to amputate usage restrictions. Cracking Tool is also termed as a Key Generator or Key Maker. Some of the cracking tools may also alter the trial version of an application in order to make it act like a licensed version.

Top   Delete Spyware

An antispyware program that scans your system for all kinds of spyware and efficiently removes them.

Top   Denial-Of-Service

Shortened to DoS, Denial-of-Service attack is an endeavor to avert legitimate users from using a particular service on a network. DoS attacks typically make use of software bugs to crash or freeze a service or resource, or bandwidth limits by making use of a flood attack to saturate all bandwidth. A denial-of-service may also target an entire organization, to either avert outgoing traffic or to stop incoming traffic to certain network services, such as the organization's web page.

Top   Distributed Denial-Of-Service

Shortened to DDoS, Distributed Denial-of-Service attack is a program that pits many machines against a single victim. The attacker installs DDoS software on all those machines thus enabling to control all the burgled machines in order to launch coordinated attacks on victim sites. Such attacks usually drain out bandwidth, router processing capacity, or network stack resources, thus breaching network connectivity of the attacked systems. It is therefore recommended to remove such a program from the system.

Top   Downloader

A Downloader is any malevolent application that is designed to salvage and install additional files. It may be helpful for hackers in downloading of malwares and unwanted software onto a victim's PC. A downloader can either be installed by the user or through exploits. It is therefore advised that such a program should be removed from a system if not installed for a purpose.

Top   Email-Flooder

An Email-Flooder is a program that inundates the e-mail account of the user with a large number of junk mail. Fictitious e-mail headers are used so that the actual identity of the sender is obscured. Some of the e-mails may also contain backdoor programs that might allow an unauthorized user to gain full remote control over the system.

Top   Email-Worm

An E-mail worm is a type of worm that uses email spoofing to spread on a user's system. This worm searches for contacts on the user's computer and then e-mails a copy of itself to all the contacts that were found on the PC. Some E-mail Worms may also use Microsoft Outlook or Outlook Express to e-mail themselves as attachments to all the entries in the address book or as a reply to incoming messages. When the user checks and opens those attachments, the system gets infected by the worm. Some of the e-mail worms may also plant a backdoor to give an intruder control of the PC, or a program to steal login and password details, as the sole purpose of the worm is destruction. A worm may also affect the hard disk and detains the user from saving or creating new files. It is arduous to detect and is therefore recommended to remove such a threat from one's system.

Top   Encryptiontool

An Encryption tool, also known as a Packer, is a utility that first compresses a file and then encrypts it in the process. It then affixes a header that automatically increases the file in memory, when executed and transfers control to that file. Some packers are able to unpack files even without compressing them. Packers are very helpful for attackers as they are quite difficult to detect thereby making their work imperceptible by anti-virus products.

Top   Flooder-SMS

A Flooder-SMS is a program that inundates channels with surplus data with the intent to disrupt normal communications. A Flooder-SMS can mutilate an instrument by corrupting vital files, such as key files, registry, and system files. It also performs Denial of Service attacks that might affect its Internet connection speed.

Top   Foistware

Foistware is software bundled with unrelated program that downloads to you computer without your knowledge. It gets installed when you install the other desirable programs.

Top   Hacker Tool

A Hacker Tool is usually a standalone file that is used by hackers to perform illicit activities on a user's system. It may be used by a hacker to gain access to the system remotely and even to capture passwords and credit card details. A system can be exposed to a lot of threat if a hacker tool is installed.

Top   Hostile Activex Controle

A Hostile ActiveX Control is a program that jeopardizes the integrity of a system and can be delivered through websites. A Hostile ActiveX program normally appears to be authentic but, in reality, it is capable of erasing data from a hard drive and also dropping a virus or trojan onto the user's system. It can even scan all the drives for tax records or documents. It is therefore recommended to remove such a threat from your system.

Top   IM Flooder

An IM Flooder is a program that floods the user's computer screen with numerous messenger windows. Such an act may result in going the user offline, crash the messenger or even force the user to restart the computer. It is only possible with single client messengers like Yahoo, AOL or MSN. The attacker can flood user's IM by holding down a combination of certain keys. As a result the user's screen becomes overloaded with numerous IM windows.

Top   IM Worm

An IM Worm is a self-replicating malevolent program that uses Instant Messaging (IM) software to spread on to the user's system. The IM Worm traces the address book for the instant messenger client, also called buddy list or contact list, and tries to remit itself to all the infected contacts. Some IM Worms also rely on social engineering techniques in order to hoax the recipient into accepting a message that contains the worm. It can also install backdoors in a computer that may be used by other worms to gain entry in the system. It is arduous to detect and is therefore recommended to remove such a threat from one's system.

Top   International Dialer

An International Dialer is an application that installs itself on the user's machine through an Internet Explorer exploit. This adware program uses the computer's modem to dial telephone numbers, usually over long distances, without the user's knowledge or consent and might also display pornographic content. It can also stay as a resident in background and make modem silent so that the user does not come to know about anything. The malicious dialer can disconnect the legitimate telephone connection used to connect to the Internet and re-connect via a premium rate number in order to charge huge telephone bills to the user. It may also result in slowing down of the computer thus interrupting the workflow. It is therefore recommended to remove this program from the system if installed without the user's permission.

Top   IRC Worme

An IRC Worm is a self-replicating malevolent program that uses Instant Internet Relay Chat (IRC) networks to spread itself on to the user's system. This worm may try to spread by setting up a connection to an IRC server or by dropping specific scripts to an IRC client directory. IRC is a form of real-time Internet chat and is primarily developed for group communication in discussion forums known as channels.IRC worms can also use the propagation methods like- sending links of infected websites or infected files to contacts gathered from the infected user. It is arduous to detect and can also install backdoors in a computer that may be used by other worms to gain entry in the system. It is therefore recommended to remove such a threat from one's system.

Top   Joke Program

A Joke program is software that amends or disrupts the normal behavior of a computer, thus creating an interruption or annoyance to the user. This program does not cause any damage to the computer and does not even collect or send information from the user's computer. Only purpose of a joke program is to disturb or frighten the user by frivolous actions.

Top   Key Logger

Key Logger is a type of observation tool that is capable of recording every keystroke. It can run in stealth mode and may also take system snapshots at regular time intervals. The captured information may include all chat conversations, email, URL of visited websites, clipboard data etc. All this information is then saved in form of logs and sent to the intruder. Some Key Loggers may also start at system boot-up and even trace out sensitive information such as passwords or credit card numbers that might be hazardous for the user. It is therefore recommended to remove such a program from the system if installed without the knowledge of the user.

Top   Malware (Generic)

Malware is malicious software that is developed in order to creep into a computer system without user's knowledge or consent. It may use widespread communication tools to multiply itself and even include worms sent via e-mails. It has the capability to alter the system settings, distort the registry and obliterate personal data. It is therefore recommended to remove such a malicious program from user's system.

Top   Monitoring Tool/PC Monitoring

A Monitoring tool is software that is designed to secretly track all the activities performed by the user. This program runs in stealth mode and is capable of capturing all keystrokes, websites visited, windows viewed, applications executed, internet connections made, passwords entered, documents accessed, chat conversations, email sent/received etc. Some of the monitoring programs may even capture screenshots of all the activities, that too without user's knowledge. All data collected is then saved to the encrypted log file located on the user's machine. This log file is decoded and entered in the database. Finally, reports from the database are converted to HTML format for convenient viewing in browser. It is therefore advisable to remove such a peril if not installed for a purpose.

Top   Network Flooder

A Network Flooder is a program that inundates channels with surplus data with the intent to disrupt normal communications. A Network Flooder can mutilate any system by corrupting vital files, such as key files, registry, and system files. It also performs DoS attacks that might lead to crashing of the server or affect its Internet connection speed. Some of the network flooders may also install a backdoor and even allow an unauthorized user to gain full remote control over the system.

Top   Network Worm

A Network Worm is a self replicating malevolent program that travels from one computer to another and tries to copy itself to other computers connected to the same LAN (Local Area Network). A network worm when stimulated, searches for all the shared resources that can be available and copies its files on that location. It then modifies WIN.INI or SYSTEM.INI files in order to make these copies start on remote systems. Some of the network worms may also copy themselves to 'start up' folders in user accounts so that they are activated every time a user logs in. A network worm also has the capability to inundate a network for hours or days because they grow logarithmically.'

Top   Nuker

A Nuker is a malicious network program that is used to immobilize a computer from a remote location by exploiting security holes to collapse system processes on the computer. Its aim is to mutilate the network configuration, files and registry entries of a system. A nuker is usually installed by other worms, trojans, backdoors or viruses and affects the performance of the computer as a whole. It may also result in system slowdown, crash or restart and can even obliterate all system and application files.

Top   P2P

A P2P (or Peer to Peer) program is a software that facilitates the user to contribute in an online file sharing network and trade. Though low in risk, a P2P system does not operate on secure lines and thus is one of the most common ways through which an adware can permeate on to a computer and ruin user's computing experience. Adware programs are often bundled into P2P file-sharing software and might flood the system with advertisements and pop-ups. They may also hijack the web browser, access personal and confidential information, deploy viruses or worms and even slow the computer to a grinding halt. Users of P2P systems are prime targets or launching points for malicious hacker attacks simply because it requires downloading and sharing electronic files or programs. Hence, it is advised to remove such a program from the system if not installed for a legitimate purpose.

Top   P2P Worm

A P2P Worm is a kind of worm that makes use of peer-to-peer networking software as its spreading vector. P2P Worms multiply by copying themselves into a shared folder that is usually located on the local machine. Once the copy is placed under a harmless name in a shared folder, the P2P network updates other users about the new resource and provides the infrastructure to download and execute the infected file. Some of the P2P worms may try to emulate the network protocol of specific file-sharing networks. It is therefore recommended to remove such a threat from one's system.

Top   Password Cracker

A Password Cracker tool is used to unveil and exhibit lost or abandoned passwords on a computer or network. This software records passwords the moment they are entered and can also send them to attackers at remote location via e-mail. A Password Cracker can also be used for illegitimate purposes and may be used in performing illicit activities such as gaining access to other computer or user's data. Though a password cracker tool cannot be executed without user's permission, it is recommended to remove such a program if not of any use.

Top   Password Hijacker

A Password Hijacker is a program that is used to uncover secret passwords on a computer or a network. This program secretly captures the passwords entered by the user in order to acquire login credentials for financial accounts and institutions. Password Hijacking tools may be used by people in order to acquire illicit control over others system. It may be run in stealth mode and can pose security and privacy threats. Hence, the user is advised to remove such a program from the system.

Top   Popup Blocker

The program that can detect and block unsolicited and annoying pop-up advertisements generated by pages on the web sites.

Top   Pop-Up, Popup

Pop-up is an unwanted window that spawns automatically over the page of the web site you have visited. Pop-ups are extensively used on web sites to display advertisements, though advertising is not the only purpose of pop-up windows.

Top   Porn Dialer

A Porn Dialer is an application that installs itself on a machine and uses the computer's modem to dial telephone numbers. It usually makes long distance calls without user's knowledge or consent in order to charge huge telephone bills and displays pornographic content. It can also stay as a resident in background and make modem silent so that the user does not come to know about anything. A porn dialer may also establish illegitimate network connections, use polymorphic tactics to transmute, disable security software, alter system files, and even install additional malware. Hence, it is recommended to remove such a program from one's system.

Top   Porn Downloader

A Porn Downloader is a malicious program that is designed to scan through various listing movie and picture galleries with the intent to download adult movies and pictures. A porn downloader can either be installed by the user to access pornographic content or even through exploits. It also assists in the distribution of unwanted advertisements on to the user's PC containing pornographic material and obscene images. This program is also capable of tracking down user's surfing habit. It is therefore advised that such a program should be removed from a system if not installed for a purpose.

Top   Port Scanner

A Port Scanner is an application that endeavors to connect to all 65536 ports on a machine in order to scan for multiple hosts for a susceptible listening port. The invader utilizes these ports to compromise the security of a network or system. It involves sending messages to every port one by one to find out the network services a system provides so that the invader is able to gain benefit of its exposure and use it for spiteful purposes.

Top   Potentially Unwanted Application

Also termed as PUA, a potentially unwanted application is software that might not pose any threat to a system but can lead to obnoxious behavior resulting in the deletion of this program. PUAs include spyware, adware, and dialers, and are often downloaded in accord with a program the user wants. A PUA can also annoy the user by displaying advertisements and even slowing down the system speed.

Top   Proxy Trojan

A Proxy Trojan is a type of Trojan that is designed to make the system act like a proxy server. It allows the attackers to access the user's system from a remote location thereby increasing the possibility of conducting credit card fraud and other illegal activities, or even to use the system to launch malicious attacks against other networks. Some of the spammers also use Proxy Trojans to circulate spam emails on a large scale. This program attaches itself onto startup processes and runs every time the system boots. It also has the capability to modify the host file, thus blocking access to security websites. Hence, it is recommended to remove such a program in order to protect the security of a computer.

Top   Remote Access Trojan

Remote Access Trojan or RAT is a program normally used to illustrate malevolent code that is installed without the user's knowledge or consent with a purpose of monitoring the computer, logging keystrokes and capturing passwords. The intruder usually obscures these trojans in games and other small programs so that credulous users are tricked into executing such softwares. A RAT also provides a "backdoor" into the system through which the devious hacker can snoop into the user's system and even control the computer from a remote location. A remote access trojan can also be divided in two parts: a Client and a Server. The client application running on one computer is then used to monitor and control a second computer running the server application. This program is a threat to user's private data, as it may record sensitive information such as passwords or credit card numbers which can be dangerous for the user and hence degrade the performance and stability of the computer.

Top   Remote Administration Tool

A remote administration tool is a program that allows a person to connect to and manage remote computers in the Internet or across a local network. This program is capable of recording all the activities performed on a system through the use of web cam surveillance technology. It also creates log files that contain information about various system activities like chat conversations, all the applications run on the computer, data copied on the keyboard and even recording all the keystrokes. It can run in stealth mode and hence not traceable by any other program running on the system. Some of the administration tools may also facilitate shutdown and reboot of the remote machine. It is therefore recommended to remove such a program from the system as it can be used to obtain confidential information and turn out to be fatal for some users if misused.

Top   Remote Control Tool

A Remote Control Tool is a program that is used for remote administration purposes. This software has the capability to remotely execute the same program simultaneously on multiple computers, without requiring preinstalled agents on target machines. It allows the remote intruder to access user's PC and perform unwanted actions ranging from basic data collection to file erasure and uploading, restart and shutdown, and even hard-drive formatting. Remote control software may comprise of two programs ' a Client and a Server. The Client program takes snapshots of the remote operating system's desktop and sends them to the Server program over network. Thus, the server program, by communicating with the clients, allows a person to see what is happening on remote computers' screens. Since this application is a monitoring tool and runs in stealth mode, it can also be misused for destructive purposes like recording personal data / keystrokes and steal confidential information from the remote computer. It is therefore advised to remove this program from the system if installed without user's knowledge.

Top   Riskware

A Riskware is an application that is basically not programmed with the intent to act as a malware but in turn contains certain security critical functions. Though not malicious, it can be misused by cyber criminals to start or stop computer processes or computer services. It is therefore recommended to remove such a program from the system in order to avoid hazardous results.

Top   Riskware-P2P

A Riskware-P2P is an application that is basically not programmed with the intent to act as a malware but in turn contains certain security critical functions. Though low in risk, P2P client tries to open up ports for itself on the user's firewall and have services for these ports running on the system. As P2P does not operate on secure lines, it can be targeted by cyber criminals to infect a machine.

Top   Rogue Antispyware Program

A Rogue Antispyware Program is software that asserts to scan and detect malware or other problems, but on the contrary they swindle users into purchasing the program by presenting the user with meddling, deceptive warnings and misleading scan results. Rogue Antispyware Programs may be installed without adequate notice and consent and also through exploits. A Rogue antispyware program can connect to the internet, modify the browser settings with a purpose to redirect home and search pages to unsolicited locations, generate excessive advertisements and shower unwanted pop-ups on the computer screen. These programs also have the capability to alter the system registry and may turn out to be harmful for the user's system. It is therefore recommended to remove such programs from the system.

Top   Rootkit

A Rootkit is a collection of one or more tools that are designed to stealthily maintain control over any computer. A Rootkit is basically installed on a machine with the intent to obfuscate utilities, files, network connections, memory addresses, or registry entries from other programs that might be used by system administrators to identify deliberate or unplanned special privilege accesses to the computer resources. It may modify various parts of the operating system or install itself as drivers or kernel modules. It is also capable of taking full control of the system and is arduous to detect. A rootkit is activated with system boot-up and may be used to exploit a system by hiding various tools and programs like backdoors, sniffers, key loggers, denial-of-service attack tools, tools to relay chat sessions, e-mail spam attacks etc. The developer of the rootkit has the capability to store log-in information from various computers and may prove to be hazardous for the user.

Top   Script Virus

A Script virus is a set of instructions that is written by any deceitful person and is capable of imitating itself on a system. It spreads from one computer to another when a user executes infected files or load infected media, especially removable media such as floppy disks or CD-ROMs. Viruses may contain a damaging payload and can also spread via email through infected attachments and files. A script virus is also capable of transmitting itself across networks and dodging security systems. It may also result in harming the computer by damaging programs, deleting files or re-formatting of the hard disk. All this can lead to inconsistent behavior of the computer, data loss and also system crashes.

Top   Scumware

Scumware is a program that secretly downloads and installs itself on your computer without your knowledge and approved consent. It tracks user information and transmit it back to the spyware author stealthily.

Top   Security Disabler

A Security Disabler is a malevolent tool that is used to immobilize anti-virus programs installed on a user's machine in order to evade detection. Some of the security disabler programs may also attempt to immobilize firewalls installed on a system. This application might prove to be helpful to the hackers as it dissuades detection and amputation of viruses and other malware infections, thus leaving a system susceptible to further damage.

Top   Security Exploit

A Security Exploit is a string of commands that is developed in order to take advantage of susceptibilities or security defects and invade the computer without user's knowledge. Once an exploit is installed on a computer, the system can be hacked and even controlled remotely for malevolent purposes. It is therefore advised to remove such a program if found on one's system.

Top   Sniffer

The term Sniffer, is normally used for a program that scrutinizes data other than network traffic. A network router that contains a sniffer reads every packet of data that is passed to it, as well as the source and destination addresses. A sniffer can be used for stealing information from a network and thus can be hazardous to a network's security as they are almost impossible to detect. It is very convenient for a hacker to insert a sniffer and steal sensitive information like passwords and credit card details.

Top   Spam

Spam is a practice of sending massive amount of unsolicited email, often product advertising or pornography. Spam has become an Internet nuisance as messages flood user's e-mail account every day.

Top   Spamming Tool

A Spamming Tool is software that is intended to extract email addresses from websites and other sources in order to send spontaneous mails to these addresses. The email may contain advertisements, usually for ambiguous products, get-rich-quick schemes, illegal services and even harmful viruses. Sending spam is reasonably feasible they do not cost much and it is not possible to hold the sender responsible for such acts. This cost is borne by the users and Internet service providers.

Top   Spyware

Spyware are misleading applications that are usually installed as hidden component of any software without your knowledge or consent. When a computer is infected with spyware, everything that you type is recorded or spied by the people or companies that have secretly installed the program on your computer. The consequences you can face includes financial and personal information theft, unusual behavior of your computer, slow Internet access, redirects homepage to malicious website, generates innumerable advertisements and much more.

Top   Spyware Attacks

Terminology used for spyware threats. Spyware can infect a computer without the knowledge and consent of the user. By a mean, its attacking user's system.

Top   Spyware Definitions

All the malicious files and registries of a spyware, added to an antispyware's database to protect your computer from all types of infections and threats.

Top   Spyware Encyclopedia

Spyware Encyclopedia is a resource for every individual who wants to track all the malicious files and registries created by a spyware. Through this encyclopedia anyone can check the exact location of every infection, which will help in analyzing the area of infection and assist in manually removing them.

Top   Spyware Infections/Spyware Detections

The malicious files and registries found on your system by an antispyware scan are spyware infections.

Top   Spyware Scan

A thorough scan initiated at various memory locations, files and folders, registry entries and cookies stored on your system. It also provides the option to take necessary action on all the spyware found during its search.

Top   Spyware Threats

Sending spyware and variants through the Internet is a common phenomenon these days. If your computer is not well protected with an efficient antispyware program, spyware could pose a threat of infecting your computer.

Top   Surveillance Tool

A Surveillance Tool is a program that observes and captures various activities performed by the user. It usually runs in stealth mode and records information like keystrokes, websites visited, windows viewed, applications and passwords used, chat conversations, documents accessed, e-mail sent and received etc. Some of the surveillance tools may also take system snapshots and then send all this information in form of encrypted logs to a predefined location. Such programs can even open illicit network connections, use polymorphic tactics to self-mutate, disable security software, modify system files, and install additional malware. Surveillance Tools can severely degrade the performance and stability of a computer and is therefore advised to be removed from the system.

Top   Toolbar-BHO

A BHO Toolbar is a type of browser plug-in that appends a third party utility bar to the web browser normally just beneath or next to the browser's address bar. It is a freeware application and may also come bundled with other softwares. This toolbar secretly creeps onto a system and performs various activities that may harm the computer. It may trace down the browsing habits and search queries of the user which can then be sent to its server so that advertisements can be displayed accordingly. It has the capability to download its own updates and even install other programs on the user's system. A BHO toolbar may also result in browser slow down; hence the user is advised to remove this program from his system.

Top   Tracking Cookies/Trackware

Tracking Cookies are cookies that have been installed on a computer in order to capture various browsing activities performed by the user. Such details may be used for target advertising and marketing campaigns by various internet Advertising and Marketing companies and even to keep a track of returning visitors and their surfing activities. It can also count the number of visitors to websites and allow web surfers to use virtual "shopping carts". Online advertising networks may use Cookies to trace users across websites and to measure ad impressions and click-throughs. Generally cookies do not pose immediate threats but can be misused to capture confidential information like user names and passwords.

Top   Trojan/Trojan Horse

A Trojan is a program that is concealed as a constructive application, but in reality contains a damaging freight. Some of the Trojans claim to get rid of computer from viruses but instead introduce nasty programs onto the user's system. The authors of Trojans use false detection techniques, e-mail, music or video downloads in order to hoax the users into installing the Trojan. Once installed, the Trojan downloads malevolent code and programs such as key loggers, screens capers, or worms from remote servers on the user's machine. A Trojan may also create a backdoor on your computer that allows the attacker to access the system, possibly allowing confidential or personal information to be compromised.

Top   Trojan Downloader

A Trojan Downloader is any malevolent application that is designed to salvage and install additional files from remote web and FTP sites. A Trojan downloader facilitates the download and installation of various other Trojans and backdoor programs on to the user's system. A downloader can either be installed by the user or through exploits. Downloaders can also be written in script languages such as VB Script and Java Script. A Trojan downloader, when executed, waits for the user to connect to the Internet. Once the internet connection is available, it endeavors to connect to a web or ftp site, download specific file(s) and run them. These downloaded files may harm the system and result in malfunctioning of the system. It is therefore advised that such a program should be removed from a system if not installed for a purpose.

Top   Trojan Dropper

A Trojan Dropper is basically a standalone program that is designed to permeate into a computer and drop trojans, worms and backdoors on to a system. Trojan droppers are usually created by special programs called 'joiners'. These programs allow modification of functionalities of a trojan-dropper and add as many files as needed into the package. When a trojan dropper is executed, it extracts all the files to a temporary folder and runs all of them simultaneously. They may also contain innocent files or multimedia files to camouflage spiteful activities.

Top   Trojan FTP

A Trojan FTP is a File Transfer Protocol server that is installed furtively on the user's PC. It permits the invader to download, upload and reinstate files on the affected machine, usually for malevolent intentions. This Trojan is normally installed through an exploit, without the knowledge or consent of the user. It hosts potentially perilous or illegitimate content from time to time on the affected machine. It also allows the unauthorized collection, distortion, or obliteration of data and renders the system more vulnerable as it may even cause damage to user's data or damage other programs installed on the infected system. It can pose security and privacy threats to one's system, needless to mention about the damage it can cause to important data and installed programs.

Top   Trojan Mass Mailer

A Mass Mailer Trojan is an application that generates e-mail addresses from a widespread range of file types found on a system. It then sends Trojans in the form of attachments to all the addresses through e-mail. This Trojan program also drops copies of itself to various other locations on the user's machine and facilitates further distribution by means of shared network drives and P2P networks. A Mass mailer Trojan is usually installed through an exploit, without user's knowledge. It also facilitates unauthorized collection, deformation, or annihilation of data and renders the system more vulnerable to threats. It may even cause damage to user's data or even damage other programs installed on the infected system.

Top   Trojan Proxy Server

A Proxy Server is a type of Trojan that arbitrates between a workstation in a networked environment and the Internet. This program can be misused by hackers by enabling them to remotely access internet from the host machine without user's knowledge. It can also be incorporated with Trojan packs by some of the coders who then sell networks of infected machines to spammers. This renders the system more susceptible and may also cause damage to user's data. Proxy Servers can also impersonate security and privacy threats to a system, needless to mention the damage it can cause to the important data and installed programs.

Top   Trojan Spy/Spy

A Trojan Spy is malevolent software that stealthily rests on any computer and tries to acquire certain information by monitoring various activities performed by the user. This application is capable of recording all keystrokes, conversations, chats, emails, websites visited, clipboard data etc. A Trojan spy may also capture system screen shots, saves all this information on the user's machine and forwards it later to the hijacker. Such an act may lead to mutilation of data and can make the system more susceptible to threats.

Top   Worm

A Worm is a reproducing program that runs independently, does not require a host file and travels across network connections. Usually a worm is installed by accidently opening an email attachment or message that contains executable scripts. Once installed on a machine, it replicates itself on the user's system till the time it does not take up all the available memory on the computer hence resulting in system slowdown and even crash. It can even spread via security holes on vulnerable machines connected to the network or through emails by sending copies of itself to all the contacts in the user's address list. A worm may also affect the hard disk and detains the user from saving or creating new files. It is arduous to detect and can also install backdoors in a computer that may be used by other worms to gain entry in the system. It is therefore recommended to remove such a threat from one's system.

Top   Worm Constructor

Worm Constructor is type of program, which is used to produce worms that posses various characteristics. Some of the worms created have the capability to add themselves to the start-up folder, modify the registry keys and even replicate themselves. A worm may not be identified by security tools and also install other malicious spywares on to the system. It is therefore recommended to remove such malicious programs from the user's machine immediately upon detection.

Microsoft Gold Certified Partner

© Systweak Inc., 1999-2017 All rights reserved.