Sunday, March 25, 2007

Spyware, Viruses, and Online Privacy

We have all been using computers long enough to have some familiarity with the trouble spyware, pop-up adds, viruses and other similar nuances cause for computer users. Often times it seems as if computers are rendered unusable because of the detrimental effects some of the programs can have on the speed and processing power of a computer. In this post I'll be looking at many types of viruses and spyware programs, how they can be prevented, and exactly what this says about online privacy in this day and age.

The term "spyware" came into popular use in 2000 when the Internet and technology boom was really beginning to take off. The purpose of the software is to expose the infected computer to various forms of advertisement for a spyware company's own commercial gain. There are many ways that spyware attempts to install itself on a computer, all of which are involved with exploiting some sort of weakness in the computer's software.

One method used to infect a computer is known as "piggybacking". Many spyware programs will come bundled with a popular computer program. When the user installs the desired computer software, the spyware software will install simultaneously with the user ever being aware of its presence. Some popular computer programs which have been known to piggyback spyware are the file sharing programs kazaa and morpheus, past versions of AOL Instant Messenger, the popular turn-based strategy game Dope Wars, and even a program from the Sony BMG music company known as Extended Copy Protection. In 2005 this program caused a great amount of controversy. The Program was put on various music Cd's from Sony and was automatically installed on a computer when the user attempted to play the CD. The program interfered with the way the Windows operating system normally played Cd’s, which ultimately exploited some security flaws allowing spyware and other virus type programs to infect the computer.

A second way spyware is installed is through deception. Internet Explorer is commonly exploited in this way. Spyware programs will often imitate a Windows dialogue box and ask some question dealing with an out of date browser, or upgrades for faster safer browsing. Instead of the "yes" and "no" buttons having the desired effect, they instead act as links to download some sort of spyware. No matter which button is pressed it is a link to the spyware program.

Internet Explorer, and Windows are typically the most affected by spyware. This is because of a couple of reasons. The first is that the majority of computer users in the world are running on the Windows operating platform, and so it is more profitable for spyware companies to develop software for Windows and not other operating systems such as Linux or the Mac OSX.

Computer viruses are vastly different and far more malicious than spyware. The main differences are in the methods of transmission, and the effects on the computer. While spyware is spread through the Internet by programs and links, viruses need a host such as a floppy disk or a flash drive, or a network through which the virus can be sent. While the purpose of spyware is mainly for advertisement and commercial gain for a corporation, viruses are used to cause harm to computer programs by deleting or damaging files. Some viruses simply make themselves know by displaying text messages, audio or video. These viruses do no real damage, however they do take up space used by other vital programs causing poor computer performance. Another difference from spyware is that viruses can copy themselves and make a slight change, much like a biological virus from which the name is derived, making them very hard to locate and delete.

However unlike biological viruses, computer viruses are not born into existence through a random occurrence; they are man made. People make viruses for many different reasons. The majority are pranks and a form of computer vandalism. Some are political and attack corporations that produce a product the virus programmer may not agree with.

Many programs are available to combat the spread of viruses and spyware. For spyware programs like Ad-aware and Spy-bot locate spyware and quarantine or delete it. For viruses, MacAfee and Norton are two of the leading virus scan and protection programs. Other than programs and software, there are groups out there against the use of spyware and the creation of viruses. The Anti-Spyware Coalition is a group of computer companies, anti-spyware companies, and other consumer groups. Their purpose is to bring an awareness of the problem between the corporations so that an agreeable solution to the spyware and virus problem can be found. Some notable members of the coalition are Microsoft, AOL, Dell Computers, MacAfee, and Google.

Many see spyware as an invasion of privacy and rightfully so. For many, browsing the web is one of the few mediums of entertainment left where they can choose which websites to go to and see advertisements that they want to see. Spyware eliminates this. Aside from the inconveniences, it can cause thousands of dollars of damage. Viruses and spyware are often detrimental to a computer’s performance, which can cause the owner to spend hundreds of dollars and software to correct the problem, or thousands on a new computer. Many spyware programs and viruses have also been linked to identity theft through the copy of bank and credit card information. I think we can all agree that nothing is as private as ones identity, and to have that stolen is a blatant and malicious invasion of ones privacy.