ok i found this spyware guide froom Pc-cilin internet sercurity 12. I hope this can help the noobs out there..
8-) 8-) 8-) 8-)
8-) 8-) 8-)
Understanding spyware and additional Internet threats
Many Internet threats are not viruses or other inherently malicious code. Rather, they are applications which compromise your privacy, allow hackers to take control of your computer without your knowledge, or annoy you. They are frequently unknowingly downloaded along with desired applications. The term "spyware" is frequently used to refer to any software that is installed without the user's full knowledge and permission, but this category of threats actually includes several other types of applications as well. In addition to spyware, there is adware, dialers, joke programs, hack tools, remote access tools, password cracking applications, and other uncategorized software.
Spyware is software that monitors a user's computing habits and personal information, and sends this information to third parties without the user's authorization or knowledge. This includes software that monitors the Web sites the user visits, records keystrokes, or takes a "snapshot" of the user's screen at intervals.
Adware, or advertising-supported software, is software that displays advertising while the program is running. Adware often functions similarly to spyware, to allow the program to determine which advertisements to display based on the current user's preference. In order to be classified as adware, and not spyware, the user must give consent to the software's installation. Some advertising-supported programs provide the user with information about how they operate, and often give the user the choice of purchasing an adware-free version. In other cases, the information about the software is frequently hidden inside the user agreement, and the user has no knowledge of what they are really consenting to.
Dialers are Trojans that, upon execution, connect the system to a pay-per-call location in which the unsuspecting user is billed for the call without his or her knowledge. Dialers often arrive in enticing service-related applications.
Joke programs are ordinary executable programs. They are added to the detection list because they are found to be potentially annoying or offensive, or because they could cause users undue worry. Joke programs cannot spread unless someone deliberately distributes them.
Hack tools are applications used by malicious programmers, known as crackers, to gain unauthorized access to other computers.
Remote access tools allow the cracker to execute functions on a computer without the user's knowledge.
Password cracking applications are used to modify software applications to make them function as if they were legally licensed copies, or to generate activation keys or serial numbers to achieve the same purpose.
Others refers to any potentially undesirable software which does not fall into any of the above categories, such as applications that redirect your browser homepage or search site to a different location.
This guide will help you identify spyware and additional Internet threats, and show you how to configure Trend Micro PC-cillin Internet Security to help guard against them.