Search for notes by fellow students, in your own course and all over the country.

Browse our notes for titles which look like what you need, you can preview any of the notes via a sample of the contents. After you're happy these are the notes you're after simply pop them into your shopping cart.

My Basket

You have nothing in your shopping cart yet.

Title: Hacking
Description: It's a complete notes on Spyware Ethical Hacking

Document Preview

Extracts from the notes are below, to see the PDF you'll receive please use the links above


SPYWARE EXPLAINED
ANTI-TROJAN
...

Banner advertising companies where going broke because internet users where getting
sick of the annoying animated gifs
...
Hackers realised that they could make easy money with proxy
clicking programs, which also led to the demise of many of the pay per click advertisers
...
Many advertisers turned to affiliate programs where publishers would get
paid for actual sales made, not just for a click on a banner
...
This is how
spyware emerged
...
Many spyware developers now use hacker exploits to install spyware onto
computers
...
It is
probably safe to say that most home users have LOTS of spyware on their computers
...

If you are unlucky you will be infected with a nastier spyware application like a porn
dialer
...
The phone bills
from porn dialers can be huge, last month my elderly neighbors received a phone bill for
over 8000 dollars, all from a porn dialer ringing up a European number from a New
Zealand based address
...
If
your homepage keeps changing to an advertisers web page, no matter how many times
you have set your favourite homepage, then you definitely have spyware
...
A very good tool for dealing with browser hijacks is a program
called hijackthis you can find this program at the following URL, along with instructions
on using it http://tomcoyote
...
Spyware coders don’t really care how sloppy their coding is, why would they?
They are only after money
...
Most anti virus applications do not recognize spyware so
removing spyware from an infected machine can be difficult
...

As more legitimate companies move towards bundling spyware with their software it is
very important that all computer users start to use spyware scanners
...
There are a lot of spyware cleaners around but not all
are reputable
...

How Can I tell I have Spyware?
Not all symptoms are easy to diagnose, but the easy symptoms to recognize include:
- Your computer slowing down to a crawl
...

- When you enter a search into your search bar, a new and unfamiliar site handles the
search
...

How should I choose a spyware scanner?
Some of the best scanners are freeware, so if you download a scanner and it detects a
heap of spyware then pops up a link to purchase the software to clean the spyware then it
could be just a scam
...
safer-networking
...
lavasoftusa
...
com) too see what it has to say about the problem
...

Prevention is often the best medicine, and choosing a non MS browser can significantly
reduce your chances of being infected with spyware from internet exploits
...
Most

good firewalls will block malicious coding; investing in a good firewall would be a great
idea
...

Sites to avoid
Free porn sites; avoid these at all costs
...

Warez and cracks: This is dodgy anyway; the webmasters who run these sites don’t care
too much about ethics
...

Mp3 sites and P2P software: These are well known to be sources of spyware, many of
the big named P2P and file sharing programs come bundled with spyware so if you must
use these programs then check on the internet before installing
...

System admins need to pay careful attention for spyware processes that may have
infected machines on their network
...

It is important to use a good process monitor, Windows 9x machines do not come with
any process monitoring software as such, and I recommend using a third party application
on all MS Windows operating systems to manage system processes (this includes
XP/NT/2000 etc)
...
The makers of Wintasks pro have set up a process library allowing system admins
to make informed decisions when ascertaining whether a process is malicious or not
...
liutilities
...
Process injection has
become very popular in the malware world
...
Spyware makers have begun to use this
technique also
...

System Safety Monitor is a freeware program that will help system admins protect
against malware code injection
...
SSM controls which programs are running on

your computer and what they are doing
...
Also, SSM will notify you whenever a program you want to start was modified
...
” http://maxcomputing
...
ru/ssme
...
If a
system admin can remove the malware entry from auto start method used, the malware
will fail to execute on reboot (even if the executable files have not been removed)
...
ini
[windows]
load=malware
...
exe
System
...
exe malware
...
bat
c:\malware
...
exe file
...
exe %1 %*"
...
exe] @="myexefile"]
[HKEY_LOCAL_MACHINE\Software\CLASSES\myexefile\shell\open\command\
@="malwaree
...
bat
A batch file that autostarts with windows
...
ini
This file is called upon when windows loads, it is then deleted
...
ini pay careful attention to the Shell=Explorer
...
exe
line
...
exe, if you do the
system will not boot into windows
...
exe http://www
...
co
...
exe, this program features over 4000 different start
up entries, and many are malware
...
A non OS specific HTML version can be downloaded here http://www
...
co
...
zip; it has all the features of the executable but can
be run on all operating systems (that support html)
...
If you are a
system administrator, it is your job to make sure that the network users at least have these
settings enabled
...
Creating a host file is straightforward
...
0
...
1 Localhost
Now you can add the spyware-infected hosts underneath like this
127
...
0
...
adroar
...
0
...
2 lists
...
com
127
...
0
...
com
Once a good list of adware servers has been made, save the file as hosts (not hosts
...
Place this file in the appropriate directory:
Windows XP
C:\WINDOWS\SYSTEM32\DRIVERS\ETC
Windows 2K
C:\WINNT\SYSTEM32\DRIVERS\ETC
Win 98\ME
C:\WINDOWS
When a computer tries to go to the malware-infected server, the hosts file will block it,
instead of going to the intended server, the server address will point locally rendering the
spyware useless (or blocking spyware from infecting the computer from a remote
location)
...
mvps
...
txt; it has a huge database of spyware, malware
and parasitic servers and will become a valuable asset in any system admins arsenal of
protection
...
spywareinfo
...
coast-info
...
htm
http://www
...
com/spyware/
http://www
...
org/
http://forum
...
com

About the author:
Jonathan Read is the webmaster for the worlds largest anti trojan website
http://www
...
org

Jonathan Read is a respected authority on remote access trojans and works as a security
consultant in New Zealand
Title: Hacking
Description: It's a complete notes on Spyware Ethical Hacking