Spyware, Adware, etc. -- Terms and Common Sense

When reading an article where some term is used often, it is useful to make sure the author of the article and you mean the same. Not surprisingly for those who still remember English lessons at school, every noun ending with "ware" is a mixture of objects having something in common--usually used for similar purposes. So it tends to be when "ware" is short for "software"; sometimes it's pretty tricky to define exactly what kind of software it includes and what these programs do.

If the terms "adware" and "spyware" are used in an article as synonyms (sometimes even experienced journalists make such a mistake), readers will just wonder why there are so many words for the same stuff. Since computer programmers and gurus don't read these articles at all, an average user feels bewildered when he finishes reading. Too many terms with too vague meanings?it's nothing more than my own impression, because I am not a programmer or a guru--just a linguist. I'm still trying to make a head and tail of it.

Spyware, adware, malware, what else? ? trackware, trapware, crapware, junkware, snoopware? Readers have heard a lot about browser hijackers, dialers, keyloggers, cookies, BHOs, Trojan horse programs, viruses, worms?What a motley crew! Is it possible for the average non-tech person to memorize their numerous definitions and knotty relations with one another? What is a part of which? If one looks trough several definitions of "spyware" given in some articles, he is going to find muddle and confusion instead of clarity.

Well, let's use common sense. Fortunately, it is sometimes easy to guess from the type of a program what such programs actually do--so, let' try. A browser hijacker is software that hijacks browsers (and does some other nasty things). Correct. A keylogger is software that logs keystrokes (ditto). Exactly.

Adware is software used for targeted advertising. Well, yes. There must be as many types of programs as there exist methods of advertising. Pop-up flood is also method of advertising. Is hijacking a browser also an approach to advertising? If it is so, creators of those annoying browser hijackers have somehow perverted logic.

And what about tracking potential customers? It is exactly the point where "adware" and "spyware" meet. People also tend to call all unwanted software "spyware" because these programs are installed without users' consent. But?nobody has ever wanted any advertising in print or on TV. Will you watch an ads-only channel? Will you buy an ads-only magazine? Online advertising just follows the tendency (sometimes going too far) to get exposure, to make a user notice ads-- at all cost.

Is spyware software used for spying, as one may deduce from the name? Yes and no. If software collects information and transmits it, such a program is automatically called "spyware" no matter how valuable this information is. That is why keyloggers (programs specially created for capturing key strokes) and cookies are both called "spyware". Well, if cookies and BHOs are kinds of spyware-- then a unicycle and roller skates are vehicles. When calling some kind of programs "spyware" we should at least consider what they "steal" and how this information is used.

Other terms are also pretty indistinct, though sometimes amusing.

Terms like " crapware" and "junkware" aren't very good, they just show attitude to such software instead of meaning anything clear.

"Malware" is too broad and too general. If one hears that some software is called malicious, he has no idea about what kind of software it is. Dividing software into malicious and benign is like dividing all, say, plants just into eatable and uneatable.

As for viruses, worms and Trojan horse programs, this fauna (not paying a slightest attention to the laws of biology) has already made up such hybrids with one another that no genetic engineer could probably dream about. Programmers say that there are almost no such viruses, worms or Trojans as they used to be only several years ago. These terms might become obsolete pretty soon because of this "evolution".

"Trojan horse" is pretty elegant term, by the way -- there is a clear idea of something benign-looking with some potentially dangerous core inside. Makes people remember history, Ancient Greeks and Homer.

All these may seem amusing for a philologist and make a good material for a linguistic study, but for an average PC user who would like to know what exactly his anti-spy software protects against, it is still a confusing mess of terms.

Alexandra Gamanenko currently works as a PR manager at the Raytown Corporation, LLC--an independent software developing company. website http://www.anti-keyloggers.com

experienced cleaning professionals Northbrook ..
In The News:

Cybersecurity experts warn about one of the largest credential compilations ever found, urging users to check "Have I Been Pwned" and change passwords immediately.
Quick iPhone and Android battery optimization techniques help your device stay powered all day by turning off hidden features that secretly drain power in the background.
Kodiak Driver autonomous truck achieves perfect 98 safety score, matching top human fleets in groundbreaking AI evaluation by Nauto's VERA system.
New 401k catch-up contribution rules in 2026 will change taxes for high earners over 50. Learn how scammers exploit these changes and protect your retirement savings.
Kurt Knutsson's guide covers social media privacy protection through location settings, account privacy controls and two-factor authentication to prevent scams and data breaches.
Revolutionary retinal implant restores central vision in 80% of patients with advanced macular degeneration, offering hope where treatments once only slowed blindness.
Learn how to use passkeys on Windows and Mac computers without cameras or fingerprint readers. Discover secure authentication methods that replace passwords.
Tesla's FSD v14.1.2 update reintroduces Mad Max mode, enabling higher speeds and more frequent lane changes than the standard Hurry profile setting.
A phishing email scam targeting American Express customers shows how cybercriminals use fake urgent messages to steal personal and financial information.
Facebook's new Meta AI feature analyzes your camera roll photos to create polished collages automatically, but requires cloud processing and raises privacy concerns.
A New Jersey teenager filed a major lawsuit against AI/Robotics Venture Strategy 3 Ltd. over ClothOff, an AI tool that created fake nude images from her social media photos.
Microsoft reports Storm-2657 cybercriminals sent phishing emails to 6,000 addresses at 25 universities to steal payroll credentials and redirect funds.
Astronomers have discovered asteroid 2025 SC79, a skyscraper-sized space rock orbiting the sun in just 128 days. the second-fastest known.
The Fox News AI Newsletter delivers the latest developments form the world of artificial intelligence, including the technology's challenges and opportunities.
A cyberattack on SimonMed Imaging exposed personal information of 1.2 million patients, including medical records, financial details and identity papers.
Spotify's managed accounts for kids under 13 now available in at least seven countries, allowing parents to filter and block explicit content and songs.
Friendly text conversations about BBQs and social events can lead to WEEX gold trading scams that target older adults with fake investment opportunities.
California company Skyeports creates self-healing glass spheres from Moon regolith that generate solar power and support plant growth for sustainable lunar living.
Cleafy researchers discover fake VPN streaming app Mobdro Pro that installs Klopatra banking Trojan, giving attackers full control over Android devices.
Police departments across the U.S. and Canada are adopting virtual reality training to better prepare officers for high-pressure, real-world situations.
House Bill 469 would prevent AI systems from owning property, serving as executives, or gaining legal personhood in Ohio under Representative Thaddeus Claggett's proposal.
Public voter records expose retirees' personal details to election scammers who create targeted cons using names, addresses, and voting history data.
Instead of fearing what comes next with artificial intelligence, think outside the box. Here are high-earning AI jobs that don't require a computer science degree.
OpenAI CEO Sam Altman says polite words like "please" and "thank you" cost millions annually, while direct prompts may improve ChatGPT accuracy by several points.
Chattee Chat and GiMe Chat exposed intimate conversations and photos, revealing users spent up to $18,000 on AI companions before the breach.

The XP Firewall Isnt Enough

You might think you don't need a firewall... Read More

Builders Beware

Which Type of Shop Can Rely On A Home Built... Read More

SQL scripts for Project Accounting: Microsoft Great Plains series ? overview for developer

Microsoft Business Solutions Great Plains has Project Accounting module where... Read More

Groupware and Online Collaboration: Collaboration Series #4

This article is the fourth of a series of articles... Read More

MicroWorld Releases New Version of MailScan Ver. 4.5 - Antivirus and Content Security Software

MicroWorld Technologies, Inc. the leading solutions provider in the area... Read More

Spyware: What It Is and How to Combat It

Spyware is software or hardware installed on a computer without... Read More

Troubleshoot Windows with Task Manager

Task Manager is a Windows system utility that displays thetasks... Read More

ERP Remote Support: Microsoft Great Plains Analysis ? Pluses & Minuses

Former Great Plains Software Dynamics/eEnterprise and currently Microsoft Business Solutions... Read More

Microsoft Great Plains Customization Tools ? Overview

Former Great Plains Software Dynamics/eEnterprise, and currently Microsoft Business Solutions... Read More

How To Create A Data Capture Procedure Checklist For Your Small Business CRM Software

Fortunately one of the most common reasons cited for the... Read More

Microsoft Great Plains GL: General Ledger ? Overview For Consultant

Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More

When is a Software Engineer Not a Software Engineer?

The title of "software engineer" has got to be among... Read More

Is Your Family Protected?

When you think... Read More

40/sec to 500/sec

IntroductionSurprised, by the title? well, this is a tour of... Read More

.NET :Solving the Multiple Inheritance Issue Under .NET Platform

.NET platform does not support multiple inheritance. Do not confuse... Read More

Microsoft Great Plains in Metal Distribution: Implementation & Customization ? Consultant Overview

Microsoft Business Solutions Great Plains serves to the wide spectrum... Read More

What is Fleet Maintenance Management?

Fleet Maintenance Management is a critical position in any company... Read More

Cisco Certification: Five Things To Do DURING Your CCNA Exam

There are plenty of articles out there about how to... Read More

SQL Administrator Skills Required to Support Microsoft Great Plains

Microsoft Great Plains is becoming more and more popular and... Read More

Microsoft Great Plains on Ctree or Pervasive SQL ? What to Do ? Tips for IT Manager

As you probably know, when Microsoft purchased Great Plains Software... Read More

The Dreaded Paper Label - Should it be Used?

While paper labeling CDs and DVDs may appear to be... Read More

Microsoft CRM Customization Secrets ? Second Edition

This article is for advanced Microsoft CRM SDK C# developers.... Read More

A Time-Saving Programming Tactic that Doesn?t Work

Let's say that you have a software project that's under... Read More

Review of TikiWiki Content Management System

TikiWiki is open source software - it is written in... Read More

How a Bug Challenges to a Software Professional

It is really interesting that a bug can create problem... Read More

best value cleaning service Northbrook ..