1. Trang chủ
  2. » Công Nghệ Thông Tin

Hacker Professional Ebook part 455 pdf

6 87 0

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 6
Dung lượng 17,88 KB

Nội dung

applications are often installed with a number of other adware programs at the same time causing an extreme load on the PC. It has also been noted that these applications have been force installed by web sites (affiliates) or Windows Media files. Company claims it no longer distributes n-case although it is unknown how many legacy installations are still in circulation. http://www.180searchassistant.com/home.html 2-Seek This adware product is in the form of a toolbar downloaded via active X control. It is very similar to the behavior of ISTBar and 2020Search. http://www.2-seek.com 2000Cracks Also known as: 2000Cracks.100 Bigorna.100 GateCrasher.110 NetController.108 Sparta.110 VagrNocker.120 VagrNocker.200 2020Search Also known as: Istbar.2020Search This toolbar is installed by active x drive by download from their website. You must first check a box signaling that you have read their very long EULA. It will prompt you to install the file and before you know it you have toolbar on your IE browser. From their EULA paragraph 3: "THE TOOLBAR MAY BE OFFERED TO YOU BUNDLED WITH ANOTHER THIRD PARTY SOFTWARE APPLICATION (A "THIRD PARTY APPLICATION"). SUCH THIRD PARTY APPLICATION IS OWNED OR LICENSED BY A THIRD PARTY AND THIS EULA DOES NOT APPLY TO YOUR USE OF SUCH OTHER THIRD PARTY APPLICATION, REGARDLESS OF WHETHER THE TOOLBAR AND THE THIRD PARTY APPLICATION CAME BUNDLED TOGETHER. YOU AGREE THAT 2020SEARCH SHALL NOT BE RESPONSIBLE FOR ANY LOSSES, DAMAGES, INJURIES, CAUSES OF ACTION, CLAIMS, DEMANDS OR EXPENSES, INCLUDING LEGAL FEES AND EXPENSES, OF WHATEVER KIND OR NATURE ARISING OUT OF, RELATING TO OR RESULTING FROM THE HIRD PARTY APPLICATION." http://www.2020search.com 20x2p This is an older adware. Their website has been shut down due to abuses apparently. It is unknown if legacy versions still exist. http://www.20x2p.com 2M Free Tetris 2M Free Tetris bundle's potentially unwanted software like Comedy-Planet , webhancer. 2nd-thought Also known as: Second Thought Trojan.Win32.SecondThought.ag SecondThought SecondThought.A Accepting their "second opinion when you surf" actually gives you a toolbar named "Mysearch". 2nd-thought will redirect your searches as long as it is installed on your computer. Browswer hijacker that will reset your home page and often redirect your searches to porn sites. Sometimes it will prevent you from changing your home page. http://www.2nd-thought.com 2Search Also known as: Adware.2Search (Symantec) clsIESpy GoogleCatch 007guard 007Installer The007Guard msnnames msn names 2Search is an adware component that installs as a Browser Helper Object, tracks key words entered into search pages and displays advertisements. For specific search words, this adware inserts custom results (exactly 3 results) at the top of the google’s result page. Tracks search words entered in google and other search pages then sends them to its controlling server. 2Spy! 1.4 2Spy is an application for monitoring, intercepting, and logging system messages on your machine such as keystrokes, mouse clicks, window activations, and so on. 2Spy can log everything you type and do: applications you use, sites you visit on the Internet, email you write, games you play, music you listen to, and more. It can even log noncharacter keys. It can silently capture your desktop or active window at various specified intervals and save it as an image onto disk. It will add time stamps to all events and log every caption in the active window title bar, as well as text on all controls. It can stay totally invisible from the user: it is invisible in the task list, in the task bar notification area, and in the system tray. 2Spy saves everything to a log file that can be located in any folder you like. The log is saved as a standard text file and can be seen or deleted directly from 2Spy. In addition, the log file can be dynamically encrypted. You can protect unauthorized access to 2Spy with a password. This product is no longer available for download. http://www.freedownloadscenter.com/U /2Spy_1_4.html 3D Falling Icons 3D Falling Icons installs 180search Assistant, Seekmo Search Assistant, and Zango Search Assistant along with it. From EULA : The Licensed Software will run in the background on your computer and may periodically direct you to our sponsors’ websites. By installing and/or using the Licensed Software you grant permission for 180 to periodically display sponsors’ websites to you. 3rdEye Also known as: third eye 3rd Eye From their website: "3rdEye Software emails all logfiles to you secretly. Monitor activity from anywhere. Automatically Records: Keystrokes & Passwords typed Screenshots of websites visited" This keylogger's home page no longer exists. It is unknown if legacy versions are still in cirulation. http://3rdeye.ws/ 404Search 404Search is adware targeted at 404search.com. It uses sites controlled by the Kanoodle search engine. The 404search engine uses an IE BHO named 404search.dll. http://www.404search.com 4Arcade PBar Also known as: SeekITAll Toolbar PBar This is an EffectiveBrand Toolbar. It attaches to your Internet Explorer. It then redirects searches and shows pop ups to its affiliates. This toolbar uses several third party components which makes it difficult to delete. Many of the third party components, however, have only been used in EffectiveBrand products. http://www.effectivebrand.com/LandingPage.aspx/CT48597 764 Dialer Dialers are software that dials a phone number. This usually happens without the end user knowing about it - causing long distance charges. 7AdPower Dialer This dialer makes it easy for their advertisers to collect statistics on their product. From their website: "Our service includes: Worldwide billing Statistics/reports are in real time with drill down capabillities Unlimited Webmaster and Technical Support GlobalPhon supplies you content to market your traffic better" http://globalphon.com/index.asp 7AdPro This adware makes it easier for Madison Administration Inc. to show you ads from their affiliates. From their website: "Each ad delivered points directly to your site allowing you to control your content and try new approaches instantly." This is refering their advertiser portion of their website. http://www.7adpower.com 7FaSSt Also known as: 7search FSInstall The addresses of all Explorer windows are passed to the server fstrack.7search.com. This includes the URLs of all web pages visited, pseudo- URLs like 'about:', and the names of folders, images and other objects in local file system. A unique user ID is used to track you across addresses visited. Cookies are also issued if you use the search toolbar. http://www.7search.com/ 96mm Allows attacker remote access to computer. ??rvices.exe Trojan A polymorphing Trojan that uses multiple startup entries. @KeyLogger Home 2.15 From the Website: "So how do you know what your staff, children, spouse or significant other type on your computer when you are away from it? Are they working on your account - or playing solitaire? @KeyLogger surveillance software can tell you exactly who is doing what on which PC at any time during the day or night. The @KeyLogger records every keystroke made on your computer on every window, emails, messages, documents, web pages, usernames, even on password protected boxes, and more." Their site has been listed for sale. Legacy versions of this software are still in circulation. A Better Internet Also known as: ABetterInternet SPYW_BISPY.A [Trend Micro] PSW.Bispy.A [Trend Micro] TR/BiSpy.DLL.B [Trend Micro] Adware.Binet [Pest Patrol] ceres nail.exe nail DRPMon Best Offers Network binet This adware program has an .EXE and a .DLL file component. The .EXE component looks for certain registry entries and deletes them, while the .DLL component maintains a particular registry entry related to a BHO. Often this product is bundled with more than one adware program. Reports of Ceres and Nail.exe being bundled and distributed through unlicensed content via BitTorrent. Company denies responsability of distribution and claims this occured through "rogue affiliate distributors". http://www.bestoffersnetworks.com/ A-311 Death 1.02 Allows remote control of the infected machine. A-Trojan 2.0 . YOU BUNDLED WITH ANOTHER THIRD PARTY SOFTWARE APPLICATION (A "THIRD PARTY APPLICATION"). SUCH THIRD PARTY APPLICATION IS OWNED OR LICENSED BY A THIRD PARTY AND THIS EULA DOES NOT. AND THIS EULA DOES NOT APPLY TO YOUR USE OF SUCH OTHER THIRD PARTY APPLICATION, REGARDLESS OF WHETHER THE TOOLBAR AND THE THIRD PARTY APPLICATION CAME BUNDLED TOGETHER. YOU AGREE THAT 2020SEARCH. pop ups to its affiliates. This toolbar uses several third party components which makes it difficult to delete. Many of the third party components, however, have only been used in EffectiveBrand

Ngày đăng: 04/07/2014, 12:20