• Español
  •  
  • Ashburn, VA

    Let us know the location you'd like to browse.

    or

    Already a Cox Residential customer?

    Looking for Business services? Go to Cox Business home

Internet

The Internet should add convenience, not headaches. From step-by-step instructions to helpful tips, we'll help you install your equipment, troubleshoot problems, and get the most out of your online experience – minus the migraine.

Back Print Article

Adware and Spyware Information for Windows-based Computers

Last Updated: Mon, 17 Feb 2014 > Related Articles

5 rated this

Summary

Learn more about adware and spyware for computers running Windows operating systems.

Solution

Want to find out more about adware and spyware? The following information provides tips and tools for avoiding, detecting, and removing adware and spyware programs.
 

 

General Information

 

According to the Center for Democracy and Technology, there are at least three general categories of applications that are sometimes described as spyware. They are:

  • Keystroke loggers and screen capture utilities, which are installed by a third party to monitor work habits, observe online behavior, or capture passwords and other information.
  • Adware and similar applications that install themselves through drive-by downloads. Or by piggybacking on other applications and tracking user behaviors in order to take advantage of their Internet connection.
  • Legitimate applications that have faulty or weak user-privacy protections.

There are many reasons why someone would install adware or spyware on your computer. The most notable include:

  • Product Advertising: Companies will pay developers of adware to find ways to show their products to you. Some may be as simple as a pop-up ad that you see when you go to a particular website. More ingenious methods involve installing a small software program on your computer that can be continuously updated by these developers when new products are available.
  • Track your web-surfing habits for marketing new products: Developers will create small programs that track your surfing habits, which are then categorized for companies to create targeted marketing campaigns.
  • Identity theft: This form is, by far, the most malicious use of spyware. Developers will create programs that capture personal information that they can use to obtain bank accounts, credit cards, and so on. Many of the most popular spyware applications promise the ability to execute using remote installation. Remote installation is the ability to put a spyware program on a computer without having physical access to the machine.

The War on Adware and Spyware

 

Cox now provides a suite of tools which includes an anti-spyware utility free with your Cox High Speed Internet Service. This application also stops pop-up and pop-under ads while you surf the Internet. Visit the Internet Tools area to download and activate your copy of Cox Security Suite Powered by McAfee.
 

Symptoms of Adware and Spyware

The best way to find out if your computer has been infested with spyware is by using software designed for that purpose. However, since many of these applications communicate with other computers -- and are programs themselves -- they use system resources, which include memory, CPU cycles, and an Internet connection. Therefore, the following are some symptoms you might notice as a result:

  • Slow Computer: Although there are many reasons why your computer may run slowly, if you use your computer daily then you are familiar with how it behaves. If your computer is older or running certain applications, this can cause a computer to run slowly. However, if suddenly it begins to run much slower, this could be a sign of an adware or spyware infection.
  • Unknown Email Activity: If you start noticing email sent without your knowledge or you start receiving a large number of bounced emails that you did not send, then you may have been infected. There are some types of programs that can send out spam from your computer using your address book. Others can return the email addresses in your address book to a spammer to be used for unsolicited email.
  • Odd Computer Behavior: You may notice strange activity with your computer, such as hard drive activity when you are not doing anything, an unknown icon in your Windows system tray, changed settings, CD drives opening and shutting, or programs mysteriously opening and closing. These could be signs of spyware running on your computer.

Detecting Adware and Spyware

 

Attempting to detect adware or spyware on your computer is not easy and depends upon the program itself. To begin, you can check your Windows Programs list or the Windows Start-Up folder. To check your Windows Programs list, go to Start / Settings / Control Panel and check under Add / Remove Programs. To check your Windows Start-Up folder, go to C:\Documents and Settings \ All Users\ Start Menu to check for any unknown programs. If you are uncertain if a program is considered adware and spyware, you can always check the program against spyware databases. which can be found by searching the Internet.
 

Removing Adware and Spyware

 

If you believe you are infected with adware and spyware, the easiest way to detect and remove it is by the use of anti-spyware software or scanning software. Anti-spyware software is a different tool from anti-virus software but operates in much the same way, by scanning the hard drive looking for files associated with known adware and spyware programs. The software then returns any found programs and allows the user to determine what course of action to take. Cox now provides a suite of tools which includes anti-spyware free with your Cox High Speed Internet Service. This application will detect possible adware and spyware on your computer and allow you to remove them. Visit the Cox High Speed Internet Internet Tools area to download and activate your copy.
 

Protecting Your Computer

 

  • Be cautious of downloads. Many of these applications are installed using drive-by downloads, which use misleading tactics to install them. Many times users have no idea they have installed the application. Many developers will design their applications to be difficult to uninstall. If a small portion remains on your computer, it has the ability to rebuild itself, so be careful what you download. Be sure to read any privacy policies offered by the site and only install applications when you are certain what functions they are performing and after you read the End User Licensing Agreement (EULA).
  • Be suspicious of pop-up ads. Do not download programs from pop-up ads or unknown sites. Also, be sure to close any window that looks suspicious, and do so properly by clicking the X in the upper right corner of the box. But we careful: some pop-up ads that contain an X will, instead of closing, actually open the ad. To be safe, always close the window from your Windows task bar by right-clicking the window located on your task bar. This is generally found at the bottom of your screen. Once found, click Close.
  • Stay updated. Keeping up with the latest security patches, fixes, and service packs will help prevent some of the pests from getting on your computer.
  • Scan regularly. Make sure you regularly scan your computer hard drive for malicious progams by using your anti-spyware tool.

Additional information on Adware and Spyware


Cox does not endorse any particular site, but you can search the Internet for spyware sites. You can also visit http://www.microsoft.com/mscorp/twc/privacy/spyware.mspx or http://www.spywareguide.com/ to learn more about adware and spyware as well as utilities for removing these types of applications.


Rate this Article:

Related Topics:

Give us your feedback:

Feedback

Maximum 500 characters

Back Print Article

Need More Help?