Hackers of India

Adware/Spyware

 Saumil Shah  , Dave Cole 

2005/10/18

Abstract

The Business

Timeline—how did we get into this mess? The players How their business works Legislative environment The Technology

Technical overview of different types of programs (taxonomy) Describe how the programs function How adware/spyware is installed Hijacking the system How it updates itself Proven techniques to prevent & remove Looking ahead

Market polarization, bad get worse, good get better (more white, less grey) Order from chaos Installations: Beyond the website Growing sophistication Exploiting Adware