It's all a matter of numbers...
Something incredible like 70% of the entire internet is porn. Legitimate businesses don't need to advertise with spyware, which leaves only illegitimate business to send it out. So you'll be getting about 70% illegitimate porn spyware, and about 30% "other" (namely penis enlargement and drugs).
Think about it - you never get spyware from a big-name company you've heard of - because they don't need to trick you into becoming a customer like a porn site does!
Rawlyn.
2006-12-04 01:50:36
·
answer #1
·
answered by Anonymous
·
1⤊
0⤋
If you visit any site on the internet, it can deposit "cookies" onto your computer. Some anti-spyware products consider these to be spyware. Yes, the sites you visit may have nothing to do with pornography and yet still deposit cookies on your computer that appar to be pornography related.
You will get spyware, trojans and other such malware on your computer if you use a Microsoft Windows operating system. Insecurites in the operatng system mean that these bad programs can be installed onto your computer simply by connecting to the internet.
In order to help slow down the infections, you will need to take a number measures. Ensure that you have a commercial anti-virus product installed - such as one provided by McAfee or Sophos. Ensure that you have a firewall enabled and that it blocks all incoming conenctions, and warns you about any outgoing connections. Ensure that you always have the latest updates from Microsoft installed. Using Mozilla Firefox in place of Microsoft Internet Explorer will also help. You can also be infected by using MSN Messenger - use an alternative product, such as GAIM or Trillian.
Linux and Mac OS X operating systems are unaffected by spyware and cannot be remotely infected.
2006-12-04 02:11:07
·
answer #2
·
answered by Linux OS 7
·
0⤊
0⤋
They are attached to your computer by sites you visit and free programs or add ons you download. Usually the software simply puts ads on your computer. It does not control WHAT ads get put on your computer. The people who installed the spyware sell the rights to have an ad appear through their program. Porn sites are one of the biggest purchasers of such ads. So you do not have to go to a porn site to get attacked by porn ads. A spyware from any site can and will cause porn ads to appear.
2006-12-04 01:51:01
·
answer #3
·
answered by dewcoons 7
·
0⤊
0⤋
Does anyone else have access to your computer?
Yes, you can get adware and spyware from many various sites. Probably while you were searching "animal stuff" you crossed a seemingly safe site when in reality it put ton's of crap on your computer.
Check out http://www.download.com and download free spyware/adware removal programs. Personally I would recommend Spyware Doctor but that costs 30 dollars for a year.
2006-12-04 01:48:21
·
answer #4
·
answered by Anonymous
·
0⤊
0⤋
Spyware is a sneaky thing....I use the combination of these 2 spyware downloads it works really well. Don't just rely on free software though, you should invest in Norton Antivirus also.
http://www.safer-networking.org/
http://www.lavasoftusa.com/software/adaware
Just pick the free personal versions of these downloads and it will help a LOT.
2006-12-04 01:47:58
·
answer #5
·
answered by razor_sharp_redhead 3
·
0⤊
0⤋
It happens, if you get a certain kind of spyware, it will show porn advertisements...use the following programs, they are all free. If you already have an antivirus, do not download AVG.
Spyware Tools:
http://www.lavasoft.nu/software/adaware/ad-aware_se_personal.php
http://www.safer-networking.org
http://www.microsoft.com/windowsdefender
http://www.merijn.org/programs.php
Anti-Virus:
http://free.grisoft.com
Cleanup:
http://www.ccleaner.com
2006-12-04 01:48:27
·
answer #6
·
answered by Yoi_55 7
·
0⤊
0⤋
Spyware does not directly spread in the manner of a computer virus or worm: generally, an infected system does not attempt to transmit the infection to other computers. Instead, spyware gets on a system through deception of the user or through exploitation of software vulnerabilities.
Most spyware is installed without users being aware. Since they tend not to install software if they know that it will disrupt their working environment and compromise their privacy, spyware deceives users, either by piggybacking on a piece of desirable software such as Kazaa, or tricking them into installing it (the Trojan horse method). Some "rogue" anti-spyware programs even masquerade as security software.
The distributor of spyware usually presents the program as a useful utility — for instance as a "Web accelerator" or as a helpful software agent. Users download and install the software without immediately suspecting that it could cause harm. For example, Bonzi Buddy, a spyware program targeted at children, claims that:
He will explore the Internet with you as your very own friend and sidekick! He can talk, walk, joke, browse, search, e-mail, and download like no other friend you've ever had! He even has the ability to compare prices on the products you love and help you save money! Best of all, he's FREE!
Spyware can also come bundled with shareware or other downloadable software, as well as music CDs. The user downloads a progam and installs it, and the installer additionally installs the spyware. Although the desirable software itself may do no harm, the bundled spyware does. In some cases, spyware authors have paid shareware authors to bundle spyware with their software. In other cases, spyware authors have repackaged desirable free software with installers that add spyware.
A third way of distributing spyware involves tricking users by manipulating security features designed to prevent unwanted installations. IE prevents websites from initiating an unwanted download. Instead, it requires a user action, such as clicking on a link. However, links can prove deceptive: for instance, a pop-up ad may appear like a standard Windows dialog box. The box contains a message such as "Would you like to optimise your Internet access?" with links which look like buttons reading Yes and No. No matter which "button" the user presses, a download starts, placing the spyware on the user's system. Later versions of IE offer fewer avenues for this attack.
Some spyware authors infect a system through security holes in the Web browser or in other software. When the user navigates to a Web page controlled by the spyware author, the page contains code which attacks the browser and forces the download and installation of spyware. The spyware author would also have some extensive knowledge of commercially-available anti-virus and firewall software. This has become known as a "drive-by download", which leaves the user a hapless bystander to the attack. Common browser exploits target security vulnerabilities in Internet Explorer and in the Microsoft Java runtime.
The installation of spyware frequently involves Internet Explorer. Its popularity and history of security issues have made it the most frequent target. Its deep integration with the Windows environment and scriptability make it an obvious point of attack into Windows. Internet Explorer also serves as a point of attachment for spyware in the form of Browser Helper Objects, which modify the browser's behaviour to add toolbars or to redirect traffic.
In a few cases, a worm or virus has delivered a spyware payload. Some attackers used the Spybot worm to install spyware that put pornographic pop-ups on the infected system's screen. By directing traffic to ads set up to channel funds to the spyware authors, they profit personally.
2006-12-04 01:47:53
·
answer #7
·
answered by Anonymous
·
1⤊
1⤋
Internet Explorer is full of security holes, use Firefox instead.
This site has a bunch of useful tips http://www.basicspywaretips.com/getridofspyware.html
2006-12-04 01:49:40
·
answer #8
·
answered by Tyler 4
·
0⤊
0⤋
maybe some one else is searching porn. go to downloads.com and see what they have that can help clean up your pc
2006-12-04 01:47:56
·
answer #9
·
answered by just me 1
·
0⤊
0⤋