1 / 48

What You Don ’ t Know Will Hurt You

What You Don ’ t Know Will Hurt You . Spyware and Computers in Public Libraries Aaron Schmidt, Thomas Ford Memorial Library www.walkingpaper.org. Outline of Talk. Assumptions What ’ s the Problem? Explanation of Spyware Removal Prevention Further Study. Assumptions.

keelty
Télécharger la présentation

What You Don ’ t Know Will Hurt You

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. What You Don’t Know Will Hurt You Spyware and Computers in Public Libraries Aaron Schmidt, Thomas Ford Memorial Library www.walkingpaper.org

  2. Outline of Talk • Assumptions • What’s the Problem? • Explanation of Spyware • Removal • Prevention • Further Study

  3. Assumptions • You have some PCs with an Internet connection • You have inexperienced patrons browsing the web • You want to serve them well • Comfort downloading and installing simple programs

  4. Keeping your Computer Clean?

  5. What’s the Problem? Popups Hijacked homepages Redirected searches Slow Operation Search bars

  6. More signs you have spyware Your phone bill includes expensive calls to 900 numbers that you never made—probably at an outrageous per-minute rate. You enter a search term in Internet Explorer's address bar and press Enter to start the search. Instead of your usual search site, an unfamiliar site handles the search.

  7. More bad signs A new item appears in your Favorites list without your putting it there. No matter how many times you delete it, the item always reappears later. Your system runs noticeably slower than it did before. If you're a Windows 2000/XP user, launching the Task Manager and clicking the Processes tab reveals that an unfamiliar process is using nearly 100 percent of available CPU cycles.

  8. Task Manager • Control-Alt-Delete

  9. Signs of spyware A search toolbar or other browser toolbar appears even though you didn't request or install it. Your attempts to remove it fail, or it comes back after removal. You get pop-up advertisements when your browser is not running or when your system is not even connected to the Internet, or you get pop-up ads that address you by name.

  10. Even more signs you have spyware When you start your browser, the home page has changed to something undesirable. You change it back manually, but before long you find that it has changed back again. Everything appears to be normal. The most devious spyware doesn't leave traces you'd notice, so scan your system anyway. http://www.pcmag.com/article2/0,1759,1522648,00.asp

  11. What is Spyware? • Malicious small programs downloaded by computer users which often record, collect and sell browsing habits.

  12. Spyware Possibly more insidious Downloaded from Web Virus Overall more destructive Self-replicating Delivered via email Spyware or Virus? Let’s call it all ‘malware’

  13. So, you want to clean up a Windows PC? Follow these (many) steps and be wary of branching out!

  14. Clearing Your Windows Internet Cache • Open IE • Tools - Internet Options - History/Delete Files/Cookies

  15. Or, Use a Program Ccleaner is included in your disc

  16. Have a Heart to Heart with Bill • http://www.windowsupdate.com

  17. Be aware of XP Service Pack 2 • XP SP2 might not play so well with current software configuration • Built in security features • Firewall • Popup blocker

  18. Scan for Viruses • http://housecall.trendmicro.com/ • http://www.trojanscan.com • http://www.symantec.com

  19. Disabling Windows System Restore 1. Click Start > Programs > Accessories > Windows Explorer 2. Right-click My Computer, and then click Properties. 3. Click the System Restore tab.

  20. Disabling Windows System Restore • You must be logged in as an Administrator. • Turning off System Restore will delete all previous restore points. You must create new restore points once you turn System Restore back on. • Check the "Turn off System Restore" or "Turn off System Restore on all drives" check box

  21. Disabling Windows System Restore Illustration

  22. Uh, what about the spyware?

  23. Remove MSFT Java • Select Start > Run and Enter "RunDll32 advpack.dll,LaunchINFSection java.inf,UnInstall" in the Open box, and click ok. • Click Yes to confirm that you want to remove the Microsoft VM • When prompted, reboot the computer • Remove the following items: (Systemroot is where windows is installed (usually C:\Windows) • The \%Systemroot%\Java folder • The file java.PNF from the \%Systemroot%\inf folder • The files jview.exe and wjview.exe from the \%Systemroot%\system32 folder • The registry subkey HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Java VM • The registry subkey HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ InternetExplorer \ AdvancedOptions \ JAVA_VM

  24. Install Sun Java • http://java.sun.com/getjava/index.html

  25. Spyware Remover? • There are many FAKE spyware removal programs. • http://www.spywarewarrior.com/rogue_anti-spyware.htm

  26. Adaware http://www.lavasoftusa.com/software/adaware/ Spysweeper http://www.webroot.com/products/spysweeper/ Spybot Search and Destory http://www.safer-networking.org Gratis Triple Antibiotic Approach

  27. Spybot Search & Destory • Quick and easy

  28. Almost done…

  29. Done!

  30. Other Spybot Info

  31. Adaware • A bit slower

  32. Choose Type of Scan

  33. Almost done… • Right-click for option to select all • Double-click for more info

  34. Spybot and Adaware • If both are installed, you may get a warning • Spybot may clean out Adaware’s quarantine folder

  35. Spysweeper • Could take 15 or 20 minutes to run

  36. Almost done… • You’re getting the picture by now.

  37. Other Spyware Removal Programs CWShredder Kazaa Begone Kill2Me

  38. Other Good Tools

  39. Effective Searches for Help • Name of spyware • Removal • Hijack • Spyware • For instance: "cool web search" removal

  40. Windows Registry? • A central database used to store information necessary to configure the system

  41. Regedit • Start – Run • Type “regedit” • Click “okay”

  42. Prevention • Impossible! • Ghosting software • Deep Freeze • WinU • Fortress

  43. Get an alternative browser! • Many pieces of spyware (the majority?) are designed to work with Internet Explorer. • Try Firefox http://www.getfirefox.com

  44. Dump RealPlayer • Or get an ad free version from the BBC http://www.bbc.co.uk/radio/audiohelp_install.shtml

  45. Watch where you surf!! • Think twice before clicking anything • Click the red X rather than ‘no’ or ‘cancel’

  46. General Spyware Removal Tools 1. Adaware 2. Spybot Search & Destroy 3. Spy Sweeper Windows Registry Tool 7. Hijack This Included on your disc Other Utilities 8. CCleaner 9. McAffe Stinger 10. Plug n' Pray 11. Shoot the Messenger Specifc Spyware Removal Tools 4. CWShredder 5. Kazaa Begone 6. Kill2Me

  47. Further Study Spyware Warrior -http://www.netrn.net/spywareblog http://tomcoyote.org

  48. Contact Info • AIM: thommyford • e: aaron@lisnews.com • w: http://www.walkingpaper.org

More Related