Combating Spyware in the Enterprise




















Find Out How Spyware Works

Learn the common and not-so-common ways spyware gets on your system and see how it can be instrumental in identity theft.

•Define Spyware, Malware, Adware, Parasiteware, Phishing, and Botnets

Find out the differences and see examples of how programs like Mytob, Netsky, Sober, Lop.com, CoolWebSearch, IRC.Flood, Agobot, and Sdbot work.

•Investigate the Methods for Getting Spyware on a System

See the different types of keystroke loggers, learn how legitimate corporations sometimes use Trojan encapsulation to conceal spyware activities, and learn the relationship between spyware and backdoors.

•Understand the Increase in Criminal Spyware Use

See how phishing attacks and botnets provide a way for mounting directed attacks against an identifiable population.

http://www.mediafire.com/?dypptzdyt1u

No comments: