are unethical programs that covertly gather user information through
an internet connection without the user's knowledge. This is usually
done for advertising purposes. When installed on a local computer,
the spyware software monitors user activity on the Internet and transmits
this information to someone else without the user's knowledge. Spyware
can also gather information about e-mail addresses and even passwords
and credit card numbers and log-in details.
In more general terms, Spyware can also refer to other internet monitoring
applications such as cookies which the user has accepted, but is
unaware of the extent of the data collected and has not understood
the extent of its distribution to third parties.
Spyware software is frequently encountered bundled
within freeware or shareware programs that can be downloaded from
agreements that accompany these software downloads may warn the
user that a spyware program will be installed along with the
software (although they may not use the term spyware), but most
users fail to read such agreements thoroughly enough to notice
it is often couched in lengthy, hard-to-read legal disclaimers.
Because spyware tend to be independent executable
programs, they have the ability to monitor keystrokes, scan files
on the hard
drive, snoop other applications, such as chat programs or word
install other spyware programs, read cookies, change the default
home page on the Web browser, consistently relaying this information
back to the spyware author who will either use it for advertising/marketing
purposes or sell the information to another party.
It is very important to scan for Spyware regularly
it, not just because it is an invasion of your privacy
but also because
the spyware software uses memory and system resources, and
also consumes bandwidth as it sends information back to the
base via the
user's Internet connection. So spyware applications running
in the background
will slow computer and internet access, and can cause system
crashes and general system instability
Free Spyware Scanners
There are many free spyware scanning
programs available on the internet. Learn more about them on our Spyware Removal page.
Keyloggers - eg SpyAnytime
Form Fillers - eg GATOR
Trackware - eg n-CASE
Downloader - eg Exploit
The more potentially sinister forms of Spyware (see also Malware) such
as Keyloggers can monitor all sorts of user activity on a local pc and
detect passwords, log-in details, networking details etc and transmit them
covertly when the user is online.
This useful online companion that fills out forms and remembers passwords
is provided free by GAIN Publishing. As part of the agreement to receive
it free, you have to accept the GAIN network adverts and software which
track your internet movements and then displays pop up adverts on your
computer screen based on your online behaviour. Although Gator isn't
much of a nuisance, it does fall into a group of software known as
spyware, sending information about buying habits, etc. for information
purposes. For this reason, many people won't use it and want to remove
it. The Gator company has recently changed their name to Claria.
To learn how to remove Gator, see Spyware Removal
An example of this is SpyAnytime and
"These keylogger spy software allow you to secretly monitor and record user's
activities on computer, such as web sites visited, windows opened, application
executed, Internet chats, every key pressed, Email, and even take snapshots of
the entire Windows desktop at set intervals, just like a invisible surveillance
camera pointed directly at your computer monitor. With this powerful keylogger
spy software, you can spy on your spouse, kids, employees, or any people you
are concerned about."
For Anti-Keyloggers and keylogger removal go to Spyware Removal
n-CASE™ is a Comparison Alternative Shopping Engine developed by 180Solutions
n-CASE is a permission based search assistant application that sponsors free
software and content sites.
n-CASE seems to be installed by an ActiveX drive-by download or bundled in with
several file sharing programs. It transmits logs of every URL visited. It will
cause pop-up advertisements and can add shortcut items to the Start-up or Desktop,
and also update itself.
According to 180Solutions inc. "n-CASE is a small application
that is downloaded to your computer and runs in the background looking
to show websites with information, offers and products that match
keywords you are looking for when either shopping or searching online"
If you have n-CASE installed, then you have either downloaded free
sponsored software or visited a website sponsored by n-CASE. Removing
n-CASE might remove or cripple software applications you like and
More information about n-CASE from 180
Remove n-CASE we have found that Spyware
Nuker has been effective in identifying and removing n-CASE from
Read more about Spyware Removal.
Exploit is a downloader. The Exploit application contacts its controlling
servers and downloads and executes applications on your computer,
including adult programs.