Find Out How Spyware Works
Learn the common and not-so-common ways spyware gets on your system and see how it can be instrumental in identity theft.
•Define Spyware, Malware, Adware, Parasiteware, Phishing, and Botnets
Find out the differences and see examples of how programs like Mytob, Netsky, Sober, Lop.com, CoolWebSearch, IRC.Flood, Agobot, and Sdbot work.
•Investigate the Methods for Getting Spyware on a System
See the different types of keystroke loggers, learn how legitimate corporations sometimes use Trojan encapsulation to conceal spyware activities, and learn the relationship between spyware and backdoors.
•Understand the Increase in Criminal Spyware Use
See how phishing attacks and botnets provide a way for mounting directed attacks against an identifiable population.
http://www.mediafire.com/?dypptzdyt1u
No comments:
Post a Comment