Feature Presentation for the April 25th general meeting
Andy Cornwall - Introduction to Spyware
Andy Cornwall - Ad-aware Spyware Elimination
General Information
Newsletter Information
Meeting Schedule for the year
Main Feature:
The feature subject is 'Perils of the Internet'.
We will start with an explanation of what a cookie is, and how they
are used. with David Potter doing the explaining.
Andy Cornwall will do the main feature:
There are a number of things that can affect ones private use of the
internet, including: Cookies, HTML, JAVA, ActiveX.
He intends to use flow charts to illustrate how these things work,
and where intervention by a user can be executed, and how it is done.
How some of these things can be disabled or re-enabled when desired.
Bill Marchant will have some windows hints available to fill time if
necessary, but it is likely that the two items above will generate a
lot of interest and conversation.
Please note the address change below:
The HAPCC general meeting is on the last Wednesday of each month.
The general meeting will be April 25th meeting time 7:00 - 9:00
pm. Meeting place: In the TV Room (Name only, there is no TV) of
the Scotia Branch of the Royal Canadian Legion,
at 5837 Cunard St Halifax. The building is facing the Halifax Commons
between Robie and Agricola Streets. The Legion parking lot is at the
right of the building and is available for our use. Meetings start
at 7:00 PM and end approximately 9:30 PM.
In this issue
Background:
Researching Internet threats to your computer will leave you paranoid.
What is Spyware?
Your computer with the Windows multitasking operating system is a
powerful platform to do your bidding; that may be word processing,
income tax preparation, displaying and editing images, playing music,
managing e-mail, surfing the web, etc. You are in control as you sit
in front of your computer and type in commands at the keyboard. But
you may not be alone, the cable connected to the back linking your
computer to the Internet (either by modem or direct connection) can
potentially provide some entity residing in the Internet almost as
much control over your computer as you have. (Indeed if you permit,
the processing power of your PC could be harnessed as part of a
computing pool operating over the Internet to conduct research, for
example, searching for life in outer space.)
The danger is that by being on the Internet others will be able to
spy on your privacy. At worst, your computer files can be copied or
corrupted. One way that this can happen is by Spyware that may be
running on your computer. Spyware is variously defined as:
- any application that retrieves data from your computer without your knowledge. www.voiceofthepeople.com
- a program that... communicates secretly with its home site. Some spyware programs are installed automatically when you visit Web sites that use them. Others are installed along with particular shareware or freeware programs. The installation can occur without your knowledge ... (PC Magazine, July 2000)
- advertising supported software ... for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales www.spychecker.com.
- Spyware is a generic term typically describing software whose purpose is to collect demographic and usage information from your computer, usually for advertising purposes. The term is also used to describe software that 'sneaks' onto the system or performs other activities hidden to the user. Spyware apps are usually bundled as a hidden component in mis-labeled 'freeware' and shareware applications downloaded from the Internet--a spyware module may be active on your computer at this moment without your knowledge! These modules are almost always installed on the system secretively, suggesting that spyware companies know how users feel about such software and figure that the best/only way to ensure its widespread use is to prevent the end-user from discovering it www.cexx.org.
At the least Spyware can track your 'clicks' on the net and copy your
browser history. Your Internet access profile can be compiled on the
basis of a unique user ID assigned to your computer by infected
software or in a cookie. If you register the adware software, or
otherwise provide personal information to an adware server, your
profile can be given a concrete identity.
Most spyware seems to be associated with advertising supported
software which connects your computer to 'adbots', advertising hosts
that deliver banner ads to your computer, that are tailored to appeal
to your interests - as determined by your Internet activity profile.
If your software shows banner ads, your computer may be running
spyware. Deleting the offending program will usually not delete the
spyware capability that was installed on your computer. You may no
longer be able to use the program and see the banner ads, but
Internet tracking can still occur. Advice: check your Tasks frequently
for suspicious processes.
According to cexx.org:
'Many adware apps install separate advertising components on your
system, that run--downloading ads and wasting system resources--even
if you're not using the software that installed them. Often, these
components remain installed and continue to perform their unsightly
duties even after the associated app has been uninstalled! Some
adware companies have even gone so far as to create 'Advertising
Trojan Horses', virus-like software programs that stealthily install
themselves on your computer to perform unwanted advertising functions
and violate your privacy whether you've installed the advertising-
supported software or not. Advertising trojans make clandestine
connections to adservers behind your back, consume precious network
bandwidth and may compromise the security of your data. The latest
versions of these 'ad-viruses' operate in full stealth and are nearly
impossible to detect without advanced knowledge of the system
environment. These include the TimeSink/Conducent TSADBOT and the
Aureate advertising trojans described in the Adware section. One
spyware module has been known to spoof a Windows system process so
that it cannot be terminated and does not appear on Windows'
End Task (Ctrl-Alt-Del) dialogue.
'Spyware modules have been implicated in computer problems including
system slowdown, Illegal Operation errors, browser crashes, and even
the 'Blue Screen Of Death'. While normal system stability has usually
returned when the interfering spyware modules were deleted, one
spyware product in particular will disable your Internet access
if you try to delete it!
Note: The ads that occur on web sites, and viewed in your browser
do not necessarily constitute Spyware, as such. There are advertising
hosts that feed web sites, and your Internet activity can be traced
via cookies placed on your machine. There is a fear that web ads can
contain JAVA, ActiveX, and VSB scripts which will be executed by your
browser to further compromise your security. Some cookies, e.g.
double click, are associated with spyware ad hosts.
Running Ad-Aware to Check for and Remove Common Spyware
So, how do get rid of spyware, which you may have running on your
machine and may not even know about? The answer, obtain and run
Ad-aware by Lavasoft
www.lavasoft.de. Ad-aware supercedes OptOut,
a program previously distributed by Steve Gibson to remove spyware.
You use Ad-aware regularly as you would a virus checking program.
The Ad-aware information base, called a signature file, needs to be
updated periodically from Lavasoft to stay current with new spyware
variants.
According to Ad-aware help:
'Basically, Ad-aware will scan your system for known advertising
systems and lets you remove them from your system. It will scan your
memory, registry and file system for known modules. if a related
module was found in memory, it means the spyware was active until
Ad-aware detected and unloaded the particular module. i.e. if
TSADBOT.EXE was found in your memory, it means that Timesink is not
only installed, but was also active. Nearly all of your Internet and
system settings are stored in the registry. Ad-aware will scan parts
of your registry for modifications or values and references to known
spyware. And finally, your hard drive(s) will be scanned for known
spyware files. After the scanning process, you can view a list of
all spyware references residing on your system, and select for
removal. In short words: Ad-aware helps you getting rid of
advertising parasites. Make sure you always use the latest version,
as Ad-aware is updated regularly.'
Refer to the attachment for information on the spyware that Ad-aware
currently detects, and on the implications for privacy intrusion from
running programs that have spyware.
Further, the Lavasoft site offers a spyware checker, which is a
searchable data base of spyware, that can tell if software you
propose to install, or have inadvertently installed, contains
spyware.
Other Spyware Protection
Blocking Web Connection to Spyware and Other Dangerous Host
Sites
You can define a file 'C:\Windows\hosts' that will filter out
Internet communications from the specified addresses. Thus, even
though a program wants to go to a certain site to deliver data on
your click strokes and web surfing, your computer will refuse to
communicate to it.
Use a Firewall
A firewall, such as ZoneAlarm, will block Internet traffic from a
program running on your computer. If there is a secret spyware
program trying to communicate with its host, the firewall will
notify you of the intended communication and ask for your permission
to precede. Note that if you are running a program that you expect to
communicate to the Internet for legitimate purposes, the permission
that you provide will also extend to its spyware function.
Use a HTML On-the-Fly Editing Program.
March 2001
A. Cornwall
In this issue
Advertising companies - what they want, what they do:
(abstracted from Ad-aware help, and is base on information provided
by the spyware hosting companies).
Adware Inc
The release of the Software is provided at no charge to the user,
because it is sponsored by advertising present in the software.
The software will not expire, nor is any payment due to
Shetef Solutions & Consulting Ltd. (the 'Author') unless the user
wishes to purchase the
full-featured commercial version. Adware shall neither attain nor
use any of your identifying
characteristics. In addition, Adware will not obtain any personal information that could
identify you including your name; picture or voice in order to match said personal characteristics
to the information in the registration form. Nevertheless, by accepting this software, you hereby
authorize Adware to use the information in your registration form
when selecting advertisements for you. By accepting their agreement,
you agree that the Software and any additional software needed will
be downloaded into your computer.
Conducent Timesink
www.conducent.com
Conducent (with Timesink technology) claims in their privacy policy
that they do not use cookies in any way and that the information
collected by them is non-personally identifiable. They also state
that they do not sell, rent or loan any information regarding desktop
users to any third party. Anyway, Timesink creates an folder with
your login name to store information and download banner ads.
Gator www.gator.com
Below is the statement by Gator for version 1.8. The statement for
previous versions is similar.
Gator and Offer Companion have both been designed to automatically
pop up to help you with forms and login pages including special
offers that are relevant to your shopping activities. Therefore
Gator needs to know where you are on the web.
Gator also maintains a user profile.
The user profile that is kept about you contains the following:
- Your email address
- Your first name
- Country
- ZIP code
- A Gator ID ( a numeric identifier) will be generated when you
download Gator
- Your master Gator password
- Information about web pages you visit (this includes the sites web
address, the time spent on each page, transaction activity where
Gator and/or OfferCompanion were used, how you got to the site and
as you left it
- What kind of ad or offer was delivered to your computer and your
response to them
- Your IP address, browser type, browser version, screen resolution,
and operating system version
If you stop using Gator and/or OfferCompanion, your profile will
remain in their online database. However Gator claims that if you
like to be removed from their database you can email your request to
be removed to removeinfo@gator.com . However you will not be deleted
from their back-up copies of earlier versions of their database.
Flyswat
Each flyswat install has an anonymous random number assigned to it.
This random number enables you to customize flyswat features and
content. The flyswat service logs anonymous click-streams as users
navigate the Web. This data has no personal or demographic
information associated with it and will be considered only in
aggregate form. flyswat uses this information for product enhancement
and may also share it with our partners to use for product
enhancement.
If the flyswat application on your computer ever fails, it will
automatically send a diagnosis back to the flyswat server, with
information about the type of system and state of usage when flyswat
failed.
Some web sites send personal information via query strings or post
data this data may be transmitted through flyswat but they claim that
they do not store it.
To submit a BoosterPack for consideration in the flyswat BoosterPack
directory, flyswat will need your e-mail address in order to
communicate with you about your submission. This personal information
will not be released to 3rd parties, and in no event will it be
associated with the random number that allows you to customize
flyswat.
Alexa www.alexa.com
Alexa collects and stores information about the web pages you view,
the data you enter in online forms and search fields while using the
Alexa software and if you are using version 5.0 or higher it will also
monitor and store information about the products you purchase online.
Some information collected is personal identifiable.
What kind of information does Alexa collect from you?
- If you are simply visiting the Alexa Web Site, they will collect
the full URL of the Web page came from, the domain name, the date and
time for each page you view, the name of and information about any
advertisement that is brought to you on the Alexa Web site; computer
and connection information such as browser type and version,
operating system, and platform. They will also place a cookie on your
computer so that they can track the pages of their Web site that you
view and the order in which you view them.
- When you download the software you will receive a cookie to the
hard drive of your computer. The cookie will assign your Web browser
a unique series of numbers, letters, or characters that will enable
Alexa to track and store information about your Web usage path and
online shopping.
When you use the Service, the company collects information about
the Web sites you visit and the pages you view. This information
allows the company to provide you with information about the Web
page you are viewing (Alexa's Site Info) and to build our database
of information about related Web pages (Alexa's Related Links).
EverAd www.everad.com
In order to use the Enabled Software, and as part of the installation process of the EverAd
Technology and the Enabled Software, the User may be required to fill a questionnaire containing one or more of t
he following: User's hobbies, age, gender, zip code, and/or other general details. The User acknowledges and agrees
that the details furnished by the User will be sent to EverAd's computers when the User connects to the Internet.
EverAd will not gather or obtain any information that identifies the User personally (such as the User's name or
e-mail address). Once the user completes the Enabled Software's installation process, an automated
system will allocate to the User a User Identification Code ("UID"). By using the UID,
EverAd is able to track the User's choices and selections without identifying the User by
name. The UID will be stored in a small encrypted text file, on the hard drive of the
User's computer. The User acknowledges and agrees to the use of the UID and its storage
in the User's hard drive.
The User acknowledges and agrees that EverAd will monitor and collect information
about the User's use of the Enabled Software. Such information
includes (but is not limited to) statistics, the User's favorite
genres, titles, and categories, the frequency in which the User
utilizes the Enabled Software, the server from which the User
downloaded the Enabled Software, the advertisements that the User is
exposed to and clicks while using the Enabled Software, and
parameters related to the User's Internet connection, etc. The User
acknowledges and agrees that on predefined intervals, when the User
connects to the Internet, this information will be automatically sent
to EverAd's servers.
The User's IP address is a 32-bit numeric string that serves as a
(usually temporary) identifier for a computer using the Internet.
The User acknowledges and agrees that EverAd will monitor and store
the User's IP address. The User acknowledges and agrees that the
information collected is EverAd's property, and EverAd may use it
according to its privacy statement (available at www.everad.com),
this End User License Agreement, and applicable laws.
WebHancer www.webhancer.com
This applies to all information collected or submitted on the
webHancer website. On some pages, you can subscribe to product
updates and promotions, make privacy requests and
seek technical support. The types of personal information collected
at these pages are your: Name, Email address.
The customer companion is a small, transparent program that
collects performance data as you transact with e-business sites.
The data collected is used to improve the service offered by
e-business operators A unique identifier is generated for WebHancer
to determine the number of times the software is downloaded,
installed and running.
Didn't anyone ever tell you that Beta is Latin for "it doesn't work yet?"
Chairperson David Potter
Vice-Chair Bill Marchant
Treasurer Rob MacCara
Web Librarian Thayne MacLean
Newsletter Editor Diane Smith
Membership Promotion Pat Conen
and the following members who assist in planning our monthly
meetings: Norman DeForest, Henry Hill, Ken Gilmour,and Colin Stuart.
The HAPCC has two kinds of
meetings. Firstly the regular Sunday night meeting which most
members attend regularly, secondly the monthly (approximately)
planning meeting which organizes the business of the Club,
including what happens on the Sundays. The planning meeting is
held on Monday, a week after the regular meeting in which all
members of the Club are urged to attend. At the planning meeting,
we discuss feature speakers for regular meetings, finances,
membership, training, and other computer related subjects.
....Bill Marchant
In this issue
Newsletter Articles.... We are almost
always in need of good articles. If anyone has something that
they feel would make a good article, an interesting story to
tell, or even a good meeting topic, please don't hesitate to pass
it on. Articles can be submitted in almost any format, ASCII
text, AMI Pro, MS Word, Windows Write, WordStar and of course
WordPerfect.
The news letter is mailed to all
paid up members and to anyone who has attended a meeting within
the past three months. Yearly membership dues are $15.00.
Club Mailing Address -
P.O. Box 29008, Halifax N.S., B3L 4T8.
In this issue
We decide the meeting dates for the
upcoming year at the last planning meeting of the season. The
dates for these are listed below. As in previous years, the
December meeting is moved to the early part of January due to
Christmas Eve being near the fourth Sunday of the month.
The planning meetings are normally held on the second Monday (8
days) after the general meeting. They are currently held at a
members home and the address is announced at the meeting prior to
the planning meeting. Anyone is welcome to assist in the planning
of future meetings or events.
Dates for the meetings starting in September are based on the
LAST Sunday in each month. Note that this is a change from
previously, when we met on the fourth Sunday.
Meeting dates for the 2000/01 season:
April 25, May 30, June 27.
Dates for the meetings starting in September are based on the
LAST Wednesday in each month. Note that this is a change from
previously, meeting times.
Note: There is no meeting in December. Remember also, we are now
using the LAST SUNDAY of the month, except for the exceptions as noted above.
Any changes to the scheduled dates will be announced where possible at the regular monthly meetings
and/or in this newsletter.