how to avoid spyware terrorism when online. http://www.leaders-mayor.blogspot.com and http://cybersecretsmasters.blogspot.com
spyware does not usually self-replicate like worms and viruses do, however, spyware by design exploits infected computers for commercial gain. Typical tactics implenting this goal include delivery of unsolicited pop-up advertisements; theft of personal information (including financial information such as credit card numbers); monitoring of Web-browsing activity for marketing purposes; or routing of HTTP requests to advertising sites.As stated earlier, Spyware does not directly spread in the manner of a computer virus or worm: generally, an infected system does not attempt to transmit the infection to other computers. Instead, spyware gets on a system through deception of the user or through exploitation of software vulnerabilities.Most spyware is installed without users' knowledge. Since they tend not to install software if they know that it will disrupt their working environment and compromise their privacy, spyware deceives users, either by piggybacking on a piece of desirable software such as Kazaa, or by tricking them into installing it (the Trojan horse method).Some "rogue" anti-spyware programs masquerade as security software, while being spyware themselves.The distributor of spyware usually presents the program as a useful utility—for instance as a "Web accelerator" or as a helpful software agent. Users download and install the software without immediately suspecting that it could cause harm.For example, Bonzi Buddy, a program bundled with spyware and targeted at children, claims that: He will explore the Internet with you as your very own friend and sidekick! He can talk, walk, joke, browse, search, e-mail, and download like no other friend you've ever had! He even has the ability to compare prices on the products you love and help you save money! Best of all, he's FREE! How pathetic! http://www.greatestjokesonline.blogspot.com