Results 1 to 4 of 4

Thread: The FAQ for <alt.privacy.spyware> [updated November 06, 2003]

  1. #1
    shplink Guest

    Re: The FAQ for <alt.privacy.spyware> [updated November 06, 2003]

    On Fri, 07 Nov 2003 04:34:48 GMT, "shplink"
    <shplink@remove.me.shplink.com> wrote:
    SNIP

    OK- my only guess is that Teranews, service I normally use, imposes
    some sort of limit on posts (I use their "free" service, but only post
    once in a blue moon...)

    I'll have to stick with Bresnan I guess.

    the alt.privacy.spyware FAQ:
    http://shplink.com/misc/FAQ.htm

  2. #2
    shplink Guest

    The FAQ for <alt.privacy.spyware> [updated November 06, 2003]

    1. What is alt.privacy.spyware?
    ---
    alt.privacy.spyware is an unmoderated newsgroup for the discussion of
    internet privacy and spyware issues. This newsgroup was formed in April of
    2000.
    ----------------------------------------------------------------------------
    ----
    2. Who can post here?
    ---
    alt.privacy.spyware is open to anyone who wishes to post, provided they
    remain on-topic and observe established standards of netiquette. Please note
    that this is a *discussion* group. Unsolicited commercial posts, also known
    as spam, are not welcome and will be reported to the offender's ISP.
    ----------------------------------------------------------------------------
    ----
    3. What is spyware?
    ---
    Spyware refers to any software capable of collecting or reporting
    information that might compromise your privacy.
    ----------------------------------------------------------------------------
    ----
    4. Can you give me some more details on the types of spyware that exist?
    ---
    Spyware can be found in many forms, such as an application program,
    installation utility, ActiveX control, Browser Helper Object, "cookies",
    (Java)script, Java applet, the HTML code found on some web sites, or any
    combination of the above. In short, ANY form of executable code and/or
    user-to-host data exchange can potentially be used to implement "spyware"
    functionality.

    Some of the more common types of spyware (but by no means a complete list)
    are:

    a. Keyloggers: Small programs which run silently in the background,
    recording every key-press and mouse-click. The data can either be recorded
    to a log which, when later "played back", will then provide a complete
    step-by-step record of exactly what the user did on the computer, or it can
    be sent via a network connection to another computer where the usage of the
    primary system can be monitored directly. Although widely considered to be
    blatant "trojan horse" programs, keyloggers and similar utilities are also
    often marketed under the guise of "parental control tools" in an attempt to
    legitimize their functionality.
    b. Ad trackers: Programs, scripts, etc., which attempt to collect data on
    who and/or how often a given ad has been viewed, and/or "clicked on," thus
    indicating a specific interest in that product or service. Ad trackers can
    be as benign as simple statistical counters, or as insidious as full-blown
    "E-pending" -i.e. the correlation of your personal data (name, street
    address, e-mail address, age, gender, income, credit history, etc.) with
    precisely which ads you have viewed and/or clicked on, when, and from what
    source.
    c. Usage trackers: Programs, scripts, etc., which attempt to collect data on
    the usage of a specific program or function (for example, tracking which
    ..MP3 files you download with file-sharing programs like KaZaa; or your usage
    of a particular application program on a particular machine, such as is done
    by such DRM tools as C-Dilla). In most cases, the collected data is either
    sent to a third party (generally without the user's fully informed consent
    or knowledge) to be used later for any of a wide variety of purposes, and/or
    used directly to determine or alter the functionality of the host
    application program.
    ----------------------------------------------------------------------------
    ----
    5. How is spyware different from, or similar to, adware?
    ---
    The term "adware" is sometimes used to describe a class of spyware.However,
    the terms are NOT interchangeable. Some spyware is also adware; but some
    (cf. keyloggers and usage trackers, above) is not. Similarly, any given
    example of adware may or may not also be spyware, depending on how it
    operates. In its purest and simplest form, the term "adware" only denotes
    applications which are in some way supported by advertising (typically, as
    you use the program, part of your screen is used to display one or more
    advertisements). If,and ONLY if, the application also engages in some sort
    of data logging/reporting (such as by "phoning home", i.e., reporting
    information or otherwise making information available to a third party such
    as the vendor or advertiser, usually via a surreptitious network connection)
    can it rightly be called "spyware".
    See Q15 below for a more detailed discussion; but in short, to be considered
    acceptable, adware MUST be implemented in such a way as to ensure the true
    consent of the user/owner AND not impinge on the user's/owner's security
    and/or privacy.
    ----------------------------------------------------------------------------
    ----
    6. Why/How is spyware a problem?
    ---
    Even in its least objectionable form, spyware exploits web users for
    someone's financial or informational profit. The installation of unsolicited
    commercial software is generally done in a sneaky, misleading or unannounced
    manner. This compromises the security and privacy of affected users,usually
    without their knowledge or consent. (Also see Q15, below)

    Many varieties of spyware will create unnecessary additional demands on the
    victim's memory and bandwidth resources, resulting in reduced computer
    performance. Generally speaking, the older or less powerful one's system,
    the greater the performance degradation one can expect to see as a result of
    spyware infections.

    How significant these additional demands will be vis-a-vis any given system
    will vary on a case-by-case basis; but, in general, even minimal-impact
    spyware can represent a noticeable additional load. In some cases, the basic
    functionality of the infected system is severely impacted. The user may no
    longer have a choice of desktop items, browser toolbars, web browser home
    page, or of which applications may be used for what task.

    In the more extreme instances, trojans and other types of spyware can do
    serious damage: They can gather information about e-mail addresses and use
    an e-mail application's address book in order to propagate. Passwords,
    financial information, and credit card numbers can be also compromised by
    this type of program.

    Advertising-supported software in general falls under a slightly different
    category. However, it can and must be presented in such a way as to get the
    true consent of the user and not impinge on security and privacy.

    Monitoring spyware, such as a keylogger, which is installed on business
    machines by an employer, also falls into a different category. The ethics of
    snooping by employers is a subject that continues to receive a lot of
    attention and debate. However, if you are using your employer's computer,
    it's a good idea to do so only for uses authorized by your employer.

    Note that the above represent a general outline of some of the problems
    related to spyware, and is not an exhaustive or definitive list of all
    possible issues or concerns. There can also sometimes be mitigating
    circumstances where some degree of spyware-like behavior is actually
    legitimate and acceptable. For example:

    - Some applications have an option to turn the spyware feature off. For
    example, "SuperCookies" in Windows Media Player, although WMP is rife with
    other, more general, security issues.
    - Some applications phone home for potentially benign reasons, such as an
    auto-update.
    If features like these default to "off," that's usually not a problem. If
    they come up with an alert box clearly and fully disclosing all relevant
    information and asking the user for permission to connect, that's usually
    not a problem. If, however, their default setting is to phone home without
    specific and explicit user approval, that should be presumptively considered
    spyware, as the user has no way to know what information will be actually
    up/downloaded, to whom, when, or why.
    ----------------------------------------------------------------------------
    ----
    7. Are there any posting restrictions, rules or guidelines?
    ---
    Unless requested, do not post the URL where you suspect you obtained your
    adware / spyware / malware / parasite infection. Instead, alter the URL in
    some way so as to make it human-readable but NOT clickable, such as
    "h**p://www.example.com". Why? Unsuspecting or inexperienced lurkers might
    just click on the URL and get unwittingly hijacked. Note that this request
    applies only to suspect URLs, and is not meant to discourage the posting of
    information about possibly rogue web sites. Please DO tell us about them;
    just do so safely.
    ----------------------------------------------------------------------------
    ----
    8. How reliable is the information I might get?
    ---
    Reliability varies and depends on many factors. Just like in any other
    unregulated/unmoderated forum, anyone can post their opinion, offer their
    expertise, and give advice. You never know who might have what ulterior
    motives, who might only have partial information, or who is a veritable
    expert on the issue they choose to address. Our recommendation is to take
    everything with a grain of salt and lurk for a while, before deciding to
    take *anyone's* advice. Lurking will give you an opportunity to be
    introduced to the regulars and to form your own opinion about the
    reliability of a poster's advice.
    ----------------------------------------------------------------------------
    ----
    9. How can I identify, prevent and eliminate spyware in my computer?
    ---
    There is not one fail-safe, guaranteed method of keeping a system
    spyware-free. There are too many variables, such as what programs you
    commonly use, what your browser of choice is, how you connect to the
    internet, etc. In most cases a combination of tools will help reduce your
    system's susceptibility to spyware.
    If you are are a Windows user, you may want to try downloading and running
    Ad-Aware and Spybot S&D before trying anything else. Hijack This! can also
    help eliminate a great number of infections. See Appendix 1 for links to
    these applications.
    Spyware applications can infect a computer in many ways. The potential for
    infection while browsing is only one of them. Sometimes spyware is
    clandestinely bundled with freeware or shareware programs which are
    downloaded from the Internet, included in regular programs that you buy at a
    retail store, might come aboard during the use of file-sharing applications,
    and so on.
    Uninstalling a program which carries offending lateral spyware is usually
    only part of the solution. In order to clean up spyware remnants from the
    original installation, you will probably need some software, or at least
    some expert advice. There are various programs, a lot of them free, which
    will help you do that.
    The best way to check a computer for infections is to use one or more of
    many "spyware sniffer" applications, and to become familiar with basic
    firewall terminology. Managing block lists and Hosts files will protect a
    computer against infection while browsing the Internet. Keep in mind that
    not all spyware eliminator programs are entirely legitimate. Asking for
    feedback in this NG will help you choose programs which are safe.

    See Appendix 1 for a list of some applications that are frequently discussed
    and used in this NG. (Posting a question here should result in considerable
    suggestions and comparisons by regulars.) We recommend that you do *not* use
    an adware uninstaller from an adware vendor - since it could and probably
    would compound your problem(s)."

    Overall, remember that "an ounce of prevention is worth a pound of cure."
    ----------------------------------------------------------------------------
    ----
    10. Why didn't (X anti-spyware program) find (Y spy program or file) on my
    computer?
    ---
    Because new spyware is being developed all the time, some of it purposely
    designed to avoid existing spyware detectors.
    ----------------------------------------------------------------------------
    ----
    11. Am I being spied upon?
    ---
    Imagine that every time you go online, a commercial internet application
    verifies its registration number against a licensing server. Is it spying on
    you?
    Well, it depends: If all the server does is check the number against a list
    and send back a go/no-go signal then it isn't spying, at least not in the
    blatant, for-profit sense we usually mean in this group. However, perhaps
    the server has a GUID (="Global Unique Identifier," your registration
    number) which is tied to your registration info, and it has your IP, and it
    knows when you're online. Let's say you fire up your browser, visit a
    website, the website sends your IP to the licensing server, and the server
    returns your name and address, etc. to the website. *Now* that internet
    application is spyware.
    ----------------------------------------------------------------------------
    ----
    12. What are third party cookies and what do they have to do with spyware?
    ---
    Cookies are a standard way for your browser to exchange information with the
    visited site. But, there is a privacy issue with third-party cookies: When
    you go to site A, which includes content from site B, site B gets to know a
    little about what you are doing at site A. If there are *many* site As --for
    example, if site B is a big advertising network-- this can be used to build
    a profile of your web usage.
    ----------------------------------------------------------------------------
    ----
    13. How can I keep track of what another person in the household is doing on
    a computer?
    ---
    This is not the proper NG for this type of question. You will find here
    mostly people who are very serious about the sanctity of personal freedoms
    and, naturally, privacy. Most of the regulars believe that communication,
    honesty and full disclosure are the greatest tools in order to avoid ever
    having to ask a question like this.
    ----------------------------------------------------------------------------
    ----
    14. Is privacy the same as anonymity on the Internet?
    ---
    No. Being anonymous in the Internet is not impossible, but it's very
    challenging. At any rate, anonymity is not the focus of this NG. However,
    the abusive behavior of spyware vendors upon the user's presumed lack of
    anonymity *is* an issue.
    A company derives value from something they take from you without your
    knowledge or consent. That meets the standards of most people's definition
    of theft.
    Spyware exploits the "lack of anonymity" for profit and returns nothing to
    the victim. Under normal circumstances, there is no value derived from the
    tracks one would leave around the net: They are a by-product. The corporate
    world has created a value/potential profit-maker in your surfing habits that
    was never intended and you did not agreed to.
    ----------------------------------------------------------------------------
    ----
    15. How is the issue of consent important when it comes to spyware?
    ---
    As mentioned previously, spyware typically sneaks into a user's computer
    without their explicit or informed consent. Being fully aware that something
    is spyware, and choosing to install it nevertheless, does not change the
    fact that it's spyware. However, since most spyware is designed to function
    clandestinely, we believe that terms like "informed" and "coerced consent"
    are important: I am about to install a program. Does it contain spyware? Am
    I fully informed? Informed should mean informed. Not "You should have read
    the EULA and deciphered it." EULAs can be intentionally ambiguous, and
    unfortunately you don't get a screen during the installation that says "This
    software monitors what websites you visit, keywords you search for, and
    reports it back to ____________. Do you accept this?" Chances are that there
    are "phone home" violations, among others, whenever you see operative words
    like "opt-in", "opt-out", and "GUID." Licensing agreements that accompany
    software downloads sometimes warn the user that a spyware program will be
    installed along with the requested software, but the licensing agreements
    may not always be read completely because they are often couched in obtuse,
    hard-to-read legal disclaimers. A great deal of software users routinely
    click on the "I agree" button of a EULA without bothering to read it very
    carefully or thoroughly. Most of us feel that this click does not truly
    constitute consent.
    Spyware can also be an application which is installed by coerced consent:
    For example, a user may be required to accept a EULA before they can install
    an essential update to a program they've come to depend on and this
    agreement might include consent to accept spyware. Or, a user may have
    already paid for an application only to find out too late for a refund that
    they have "explicitly agreed" to the installation of spyware.
    ----------------------------------------------------------------------------
    ----
    16. How can I be spyware-free without all this hassle?
    ---
    Using an open-source operating system and strictly open-source applications
    downloaded from reliable sources will minimize the risk. However, as
    open-source becomes more popular, it seems inevitable that there will be
    spyware which targets it. Some source code is difficult to comprehend and
    could mask spyware. Also, there is much freeware that is safe. Od course,
    checking with others before downloading/installing is sensible advice.
    ----------------------------------------------------------------------------
    ----
    17. Do different types of programs exhibit different degrees of
    vulnerability to spyware?
    ---
    As mentioned in a previous question, the spyware "machine" mutates and
    evolves based on market conditions. The primary concern of a spyware
    manufacturer is volume of users. The more people who use a certain program,
    or a certain version of a program, the greater the chances are that it has
    become a more attractive target for spyware.
    ----------------------------------------------------------------------------
    ----
    Appendix 1. Some helpful URLs: Free programs and further information.
    Note that any opinions and recommendations in the links below are not
    necessarily those of the majority of this newsgroup.
    ---
    Sponge's Site:
    http://www.geocities.com/yosponge/
    Sponge is a regular contributor to this newsgroup. His site is full of good
    information for beginners and advanced users alike.

    Kerio:
    http://www.kerio.com/us/kpf_home.html Kerio is the firewall preferred by a
    lot of experienced users. See sponge's site above for specific rule sets
    tailored to your requirements.
    http://www.blarp.com/faq/faqmanager.cgi?toc=kerio Kerio firewall FAQ.
    http://www.dslreports.com/forum/kerio Kerio forum at DSL Reports

    Zone Alarm:
    http://www.zonelabs.com Zone Alarm is a firewall popular among beginners.

    Outpost Firewall:
    http://www.agnitum.com/products/outpost/#

    Proxomitron:
    http://www.proxomitron.org
    or http://www.imilly.com/tools.htm Free web proxy server.

    Privoxy:
    http://www.privoxy.org/ Same as the Proxomitron, but also runs on Linux

    Ad Aware:
    http://www.lavasoft.de/
    http://www.lavasoftusa.com/
    http://lavasoft3.element5.com
    Three mirror sites from where you can download Ad-Aware, a spyware
    eliminator. Lavasoft (makers of Ad Aware) forum:
    http://www.lavasoftsupport.com (requires registration)

    Spybot Search and Destroy:
    http://security.kolla.de/
    http://spybot.eon.net.au
    Spyware eliminator. SpyBot threats database:
    http://spybot.safer-networking.de/in...gebase/threats
    (URL may mirror to another, depending a server load at the time)

    DNS Kong:
    http://www.pyrenean.com/dnsintro.php DNS lookup redirector

    Spider:
    http://www.fsm.nl/ward File cleaner, will deal with the infamous MS "hidden
    files" among other things.

    A hosts file:
    http://www.mvps.org/winhelp2002/hosts.htm

    Hijack This!
    http://www.spywareinfo.com/~merijn/index.html There's a link for a great
    utility that wipes out Kazaa entirely, which works as well as Hijack This! A
    note on the latter, use with caution, it's a bit of a Beta utility. If you
    use it, post your scan results log in the newsgroup for us to check out
    before you take any further action.

    Spywareblaster:
    http://www.wilderssecurity.net/spywareblaster.html Preventive tool.

    MRU-blaster:
    http://www.wilderssecurity.net/mrublaster.html Detects and cleans up MRU
    lists and other "hidden" stored information.

    SpywareGuard:
    http://www.spywareinfo.com/downloads/swguard/ SpywareGuard provides a
    real-time protection solution against spyware that is a great addition to
    SpywareBlaster's protection method. An anti-virus program scans files before
    you open them and prevents execution if a virus is detected - SpywareGuard
    does the same thing, but for spyware! And you can easily have an anti-virus
    program running alongside SpywareGuard.

    Andrew Clover's parasite detection page:
    http://www.doxdesk.com/parasite/ Contains a script that scans for common
    parasites.

    Chris Quirke's Malware page:
    http://users.iafrica.com/c/cq/cquirke/malware.htm A bit out-dated but
    informative.

    CEXX:
    http://www.cexx.org/adware.htm
    CEXX discussion board:
    http://boards.cexx.org/

    Mike Healan's Spyware info:
    http://www.spywareinfo.com
    Spywareinfo Board:
    http://www.spywareinfo.com/yabbse/ requires registration

    http://www.staff.uiuc.edu/~ehowes/main-nf.htm
    A general Privacy & Security site that is a compilation of links to third
    party applications and utilities - use these with caution - post here if you
    are uncertain.

    http://unwantedlinks.com/

    Information about data mining:
    http://www.anderson.ucla.edu/faculty...datamining.htm

    Nice info regarding some known nasties and links to tools:
    http://www.imilly.com/



  3. #3
    Randall Bart Guest

    Re: The FAQ for <alt.privacy.spyware> [updated November 06, 2003]

    'Twas Fri, 07 Nov 2003 04:32:26 GMT when all alt.privacy.spyware stood in
    awe as shplink <shplink@removeme.shplink.com> uttered:

    >Date: Fri, 07 Nov 2003 04:32:26 GMT
    >From: shplink <shplink@removeme.shplink.com>
    >X-Newsreader: Forte Free Agent 1.93/32.576 English (American)
    >
    >On Fri, 07 Nov 2003 04:34:48 GMT, "shplink"


    Compare those time stamps. You replied to a message over two minutes
    before you sent it. I am guessing that one of your newsservers has a
    maladjusted clock.

    >OK- my only guess is that Teranews, service I normally use, imposes
    >some sort of limit on posts (I use their "free" service, but only post
    >once in a blue moon...)


    Maybe Teranews restricts the maximum size of a message, or rejects
    messages containing URLs or more than some number of URLs.
    --
    RB |\ © Randall Bart
    aa |/ admin@RandallBart.spam.com Barticus@att.spam.net
    nr |\ Please reply without spam I LOVE YOU 1-917-715-0831
    dt ||\ They're Murdering Terri Schiavo http://www.terrisfight.org
    a |/ Multiple sclerosis: http://www.cbc.ca/webone/alison/
    l |\ DOT-HS-808-065 The Church Of The Unauthorized Truth:
    l |/ MS^7=6/28/107 http://yg.cotut.com mailto:s@cotut.com

  4. #4
    shplink Guest

    Re: The FAQ for <alt.privacy.spyware> [updated November 06, 2003]

    On Mon, 10 Nov 2003 15:05:47 GMT, Randall Bart <Barticus@att.spam.net>
    wrote:

    SNIPPAROONIUS MAXIMUS

    >Maybe Teranews restricts the maximum size of a message, or rejects
    >messages containing URLs or more than some number of URLs.


    Thanks Randall, that's a good guess. I'll stick with Bresnan for the
    FAQ posts.


    the alt.privacy.spyware FAQ:
    http://shplink.com/misc/FAQ.htm

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •