{"id":12164,"date":"2022-04-12T16:04:33","date_gmt":"2022-04-12T16:04:33","guid":{"rendered":"https:\/\/thetalks.co.in\/?p=12164"},"modified":"2022-04-12T16:04:35","modified_gmt":"2022-04-12T16:04:35","slug":"why-do-i-feel-like-somebodys-watching-me","status":"publish","type":"post","link":"https:\/\/thetalks.co.in\/?p=12164","title":{"rendered":"Why Do I Feel Like Somebody\u2019s Watching Me?"},"content":{"rendered":"\n<p>Spyware is one of the fastest-growing internet threats.&nbsp; According to the National Cyber Security Alliance, spyware infects more than 90% of all PCs today.&nbsp; These unobtrusive, malicious programs are designed to silently bypass firewalls and anti-virus software without the user\u2019s knowledge.&nbsp; Once embedded in a computer, it can wreak havoc on the system\u2019s performance while gathering your personal information.&nbsp; Fortunately, unlike viruses and worms, spyware programs do not usually self-replicate.&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Where does it come from?<\/strong><\/p>\n\n\n\n<p>Typically, spyware originates in three ways.&nbsp; The first and most common way is when the user installs it.&nbsp; In this scenario, spyware is embedded, attached, or bundled with a freeware or shareware program without the user\u2019s knowledge.&nbsp; The user downloads the program to their computer.&nbsp; Once downloaded, the spyware program goes to work collecting data for the spyware author\u2019s personal use or to sell to a third-party.&nbsp; Beware of many P2P file-sharing programs.&nbsp; They are notorious for downloads that posses spyware programs.<\/p>\n\n\n\n<p>The user of a downloadable program should pay extra attention to the accompanying licensing agreement.&nbsp; Often the software publisher will warn the user that a spyware program will be installed along with the requested program.&nbsp; Unfortunately, we do not always take the time to read the fine print. &nbsp;Some agreements may provide special \u201copt-out\u201d boxes that the user can click to stop the spyware from being included in the download.&nbsp; Be sure to review the document before signing off on the download.<\/p>\n\n\n\n<p>Another way that spyware can access your computer is by tricking you into manipulating the security features designed to prevent any unwanted installations.&nbsp; The Internet Explorer Web browser was designed not to allow websites to start any unwanted downloads.&nbsp; That is why the user has to initiate a download by clicking on a link.&nbsp; These links can prove deceptive.&nbsp; For example, a pop-up modeled after a standard Windows dialog box, may appear on your screen.&nbsp; The message may ask you if you would like to optimize your internet access.&nbsp; It provides yes or no answer buttons, but, no matter which button you push, a download containing the spyware program will commence. Newer versions of Internet Explorer are now making this spyware pathway a little more difficult.<\/p>\n\n\n\n<p>Finally, some spyware applications infect a system by attacking security holes in the Web browser or other software.&nbsp; When the user navigates a webpage controlled by a spyware author, the page contains code designed to attack the browser, and force the installation of the spyware program.<\/p>\n\n\n\n<p><strong>What can spyware programs do?<\/strong><\/p>\n\n\n\n<p><strong><br><\/strong>Spyware programs can accomplish a multitude of malicious tasks.&nbsp; Some of their deeds are simply annoying for the user; others can become downright aggressive in nature.<\/p>\n\n\n\n<p><br>Spyware can:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Monitor your keystrokes for reporting purposes.<\/li><li>Scan files located on your hard drive.<\/li><li>Snoop through applications on our desktop.<\/li><li>Install other spyware programs into your computer.<\/li><li>Read your cookies.<\/li><li>Steal credit card numbers, passwords, and other personal information.<\/li><li>Change the default settings on your home page web browser.<\/li><li>Mutate into a second generation of spyware thus making it more difficult to &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; eradicate.<\/li><li>Cause your computer to run slower.<\/li><li>Deliver annoying pop up advertisements.<\/li><li>Add advertising links to web pages for which the author does not get paid.&nbsp; Instead, payment is directed to the spyware programmer that changed the original affiliate\u2019s settings.<\/li><li>Provide the user with no uninstall option and places itself in unexpected or hidden places within your computer making it difficult to remove.<\/li><\/ol>\n\n\n\n<p><strong>Spyware Examples<\/strong><\/p>\n\n\n\n<p>Here are a few examples of commonly seen spyware programs.&nbsp; Please note that while researchers will often give names to spyware programs, they may not match the names the spyware-writers use.&nbsp;<\/p>\n\n\n\n<p><strong><a href=\"http:\/\/en.wikipedia.org\/wiki\/CoolWebSearch\">CoolWebSearch<\/a><\/strong>, a group of programs, that install through \u201choles\u201d found in Internet Explorer. These programs direct traffic to advertisements on Web sites including <em>coolwebsearch.com<\/em>. This spyware nuisance displays pop-up ads, rewrites <a href=\"http:\/\/en.wikipedia.org\/wiki\/Search_engine\">search engine<\/a> results, and alters the computer host file to direct the Domain Name System (DNS) to lookup preselected sites.&nbsp;<\/p>\n\n\n\n<p><strong><a href=\"http:\/\/en.wikipedia.org\/w\/index.php?title=Internet_Optimizer&amp;action=edit\">Internet Optimizer<\/a> (<\/strong>a\/k\/a DyFuCa<strong>)<\/strong>, likes to redirect Internet Explorer error pages to advertisements. When the user follows the broken link or enters an erroneous URL, a page of advertisements pop up.<\/p>\n\n\n\n<p><strong><a href=\"http:\/\/en.wikipedia.org\/wiki\/180_Solutions\">180 Solutions<\/a><\/strong> reports extensive information to advertisers about the Web sites which you visit.&nbsp; It also alters HTTP requests for <a href=\"http:\/\/en.wikipedia.org\/wiki\/Affiliate_marketing\">affiliate<\/a> advertisements linked from a Web site.&nbsp; Therefore the 180 Solutions Company makes an unearned profit off of the click through advertisements they\u2019ve altered.<\/p>\n\n\n\n<p><strong><a href=\"http:\/\/en.wikipedia.org\/w\/index.php?title=HuntBar&amp;action=edit\">HuntBar<\/a> <\/strong>(a\/k\/a WinTools) or <strong><a href=\"http:\/\/securityresponse.symantec.com\/avcenter\/venc\/data\/adware.websearch.html\">Adware.Websearch<\/a><\/strong>, is distributed by <a href=\"http:\/\/www.trafficsyndicate.com\/\">Traffic Syndicate<\/a> and is installed by ActiveX drive-by downloading at affiliate websites or by advertisements displayed by other spyware programs.&nbsp; It\u2019s a prime example of how spyware can install more spyware.&nbsp; &nbsp;These programs will add toolbars to Internet Explorer, track Web browsing behavior, and display advertisements.<\/p>\n\n\n\n<p><strong>How can I prevent spyware?<\/strong><\/p>\n\n\n\n<p>There are a couple things you can do to prevent spyware from infecting your computer system.&nbsp; First, invest in a reliable commercial anti-spyware program.&nbsp; There are several currently on the market including stand alone software packages such as Lavasoft\u2019s Ad-Aware or Windows Antispyware.&nbsp; Other options provide the anti-spyware software as part of an anti-virus package.&nbsp; This type of option is offered by companies such as Sophos, Symantec, and McAfee. Anti-spyware programs can combat spyware by providing real-time protection, scanning, and removal of any found spyware software.&nbsp; &nbsp;As with most programs, update your anti virus software frequently.&nbsp;<\/p>\n\n\n\n<p><a><\/a>As discussed, the Internet Explorer (IE) is often a contributor to the spyware problem because spyware programs like to attach themselves to its functionality.&nbsp; Spyware enjoys penetrating the IE\u2019s weaknesses.&nbsp; Because of this, many users have switched to non-IE browsers.&nbsp; However, if you prefer to stick with Internet Explorer, be sure to update the security patches regularly, and only download programs from reputable sources.&nbsp; This will help reduce your chances of a spyware infiltration.<\/p>\n\n\n\n<p><strong>And, when all else fails?<\/strong><\/p>\n\n\n\n<p>Finally, if your computer has been infected with a large number of spyware programs, the only solution you may have is backing up your data, and performing a complete reinstall of the operating system.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Spyware is one of the fastest-growing internet threats.&nbsp; According to the National Cyber Security Alliance, spyware infects more than 90% of all PCs today.&nbsp; These unobtrusive, malicious programs are designed to silently bypass firewalls and anti-virus software without the user\u2019s knowledge.&nbsp; Once embedded in a computer, it can wreak havoc on the system\u2019s performance while [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":12165,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[8],"tags":[],"class_list":["post-12164","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"_links":{"self":[{"href":"https:\/\/thetalks.co.in\/index.php?rest_route=\/wp\/v2\/posts\/12164","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thetalks.co.in\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetalks.co.in\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetalks.co.in\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetalks.co.in\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12164"}],"version-history":[{"count":1,"href":"https:\/\/thetalks.co.in\/index.php?rest_route=\/wp\/v2\/posts\/12164\/revisions"}],"predecessor-version":[{"id":12166,"href":"https:\/\/thetalks.co.in\/index.php?rest_route=\/wp\/v2\/posts\/12164\/revisions\/12166"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thetalks.co.in\/index.php?rest_route=\/wp\/v2\/media\/12165"}],"wp:attachment":[{"href":"https:\/\/thetalks.co.in\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12164"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetalks.co.in\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12164"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetalks.co.in\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12164"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}