Secrets of Adware and Spyware
By Wallace Wang
Adware: Software with Built-In Advertising
For the longest time, there were four categories of software: commercial programs that you purchased before you could try them, shareware that you could try and purchase if you found it useful, freeware that you could use without ever paying for it (although the programmer retained the copyright), and public domain software that nobody owned so you could freely use it and modify it if you wanted.When programmers wanted to make money selling a program, they often released their creations as shareware, so people all over the world could try it for free. If the program proved popular, they usually turned it into a commercial product.
Although a handful of shareware programs turned their creators into millionaires, many more simply earned a small amount of change for the programmers and that's it. To increase their odds of success, many shareware programmers decided to turn their creations into a new category of software dubbed adware.
As the name implies, adware displays advertisements as the program runs. If you're connected to the Internet, the adware program may access a server and display an ever-changing array of advertisements every time you use the adware program.
By incorporating advertisements in their programs, programmers can ensure that they earn a certain amount of money whether people ultimately register and pay for the program or not. Advertisers love adware since it provides access to more potential customers. Unfortunately, the only people who don't seem to care for adware are the people using it.
By itself, adware can be annoying but harmless. However, instead of being content to just display advertisements, some adware programs secretly retrieve information from the user's computer and transmit this information back to the advertiser, which is a characteristic of programs known as spyware. This information could be as simple as the type and version of the operating system on your computer, or your IP address along with a list of all the cookies stored on your computer, which an advertiser can examine to determine your browsing habits. When you run an adware program, it's possible that the adware program could be transmitting your browsing and online shopping habits to the advertiser without your consent, which can be as disconcerting as finding a stranger in your kitchen making a note of all the name-brand food products you bought in the past three days.
For more information about adware, visit the Adware.info site. In case you're curious about the types of companies that help programmers develop adware, visit the Software Marketing Resource page.
Defending against adware
Since so many people find the idea of their programs bombarding them with advertisements less than appealing, most adware programs disguise their built-in advertising. To help you find adware programs that may be lurking on your computer, download a free copy of Ad-aware.Like an antivirus program, Ad-aware scans your memory, hard disk, and registry file to look for files that may be unique to known adware programs, such as CuteFTP, NetSonic, or Go!Zilla. Once it finds a known adware program, Ad-aware gives you the option of removing it completely from your system.
For another adware removal tool, visit Bulletproof Software and try their BPS Spyware/Adware Remover. Unlike Ad-aware, BPS Spyware/Adware Remover isn't free, but it does include features to scan and remove any spyware it finds on your computer.
Better yet, visit the Spychecker site before you download that shareware or freeware program. Spychecker has a database of all known adware programs, so you can find out if a program will spy on you before you decide to download and install it.
Adware vs. Ad-aware
Not surprisingly, Ad-aware's efforts have upset a great many advertisers and adware programmers, who see Ad-aware as a threat to their source of income. One adware program in particular, RadLight version 3.03 release 5.0 would scan your hard disk for Ad-aware. If it found Ad-aware lurking on your computer, RadLight would secretly uninstall it without your knowledge. That way it could continue flooding your computer with advertisements and transmitting your data back to the advertiser without Ad-aware's interference.At the time Igor Janos, author of the RadLight software claimed, "As Ad-aware's behavior was hostile to our bundle, I had to defend."
This immediately set up a backlash against RadLight, so the later version of RadLight 3.03 release 5.2 gives you the option of uninstalling Ad-aware or not. To further distance itself from the negative label of "adware," RadLight now promotes its ad-supported version as "helpware," as if advertisements somehow "help" the user in any way. While this compromise isn't perfect, at least it gives you, the user, a choice in the matter. Naturally, a far more effective choice is to simply avoid using any adware programs at all, while using the Ad-aware program regularly to keep your computer free of such annoyances.
The Only Sure Way to Protect Your Privacy
If you never connect to the Internet, you can protect yourself against the large majority of Web bugs, adware, pop-up ads, and spyware. Since that isn't an option for many people, your next best solution is to understand how various threats to your privacy work, and then use protective programs to defend against each threat, such as Bugnosis, Ad-aware, and anti-spyware programs.Maybe your computer isn't bugged, and maybe nobody is spying on you. But is it worth the risk of losing your privacy not to find out?
Wallace Wang
Steal This Computer Book
What They Won't Tell You About the Internet
This offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. The third edition of this bestseller (over 150,000 copies sold) adopts the same informative, irreverent, and entertaining style that made the first two editions a huge success. Thoroughly updated, this edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.Best-selling computer book author Wallace Wang is a former contributor to Boardwatch Magazine, where he wrote a monthly column called "Notes From the Underground." He is also a successful stand-up comic who has appeared on A&E's "Evening at the Improv" and appears regularly at the Riviera Comedy Club in Las Vegas.
Return to the Business Department, or back to the Front Page
Participate in your Design Center
Lots of fun and information for all... don't forget, any community is only as good as the participation of its members. We invite your tips, tricks, comments, suggestions and camaraderie.- Ask for the DT&G Monthly: to receive news about DT& headlines, happenings in the Design Center and regular columns like the "Mail Bag" and "Cool Sites"
- SUBSCRIBE : to the Designers' CAFE email list
Photoshop Photo Retouching Learn the art of photo retouching in Photoshop from expert pre-pres and Photoshop wizard Joseph Kling. No line-camping... download and start learning!
Advertise your products or services among these pages! Call: 540-433-8402 for details.