Tuesday, October 19, 2010

Adware



                     Software in the second category installs itself covertly, generally by piggybacking on another, unrelated application or by deceptive download practices. These programs start-up on their own and make unauthorized use of users’ computers and Internet connections, in many cases transmitting information about the user or it’s computer back to a central location. They often resist uninstallation. 

                     They usually do not capture keystrokes or screnshots. In part because applications in this second category fall into a legal grey-zone, they have recently been the focus of a great deal of attention and concern.