(n.) Any software that covertly gathers user information through the user’s Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that the majority of shareware and freeware applications do not come with spyware. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers.
Spyware is similar to a Trojan horse in that users unwittingly install the product when they install something else. A common way to become a victim of spyware is to download certain peer-to-peer file swapping products that are available today.
Aside from the questions of ethics and privacy, spyware steals from the user by using the computer’s memory resources and also by eating bandwidth as it sends information back to the spyware’s home base via the user’s Internet connection. Because spyware is using memory and system resources, the applications running in the background can lead to system crashes or general system instability.
Because spyware exists as independent executable programs, they have the ability to monitor keystrokes, scan files on the hard drive, snoop other applications, such as chat programs or word processors, install other spyware programs, read cookies, change the default home page on the Web browser, consistently relaying this information back to the spyware author who will either use it for advertising/marketing purposes or sell the information to another party.
Licensing agreements that accompany software downloads sometimes warn the user that a spyware program will be installed along with the requested software, but the licensing agreements may not always be read completely because the notice of a spyware installation is often couched in obtuse, hard-to-read legal disclaimers.
See The Difference Between Adware & Spyware in the Did You Know…? section of
- squash and stretch
In 3D animation, squash and stretch is a technique that is applied to an animated or in-motion characters to give them a more exaggerated movement. Traditional cartoon animation contains a large amount of squash and stretch — think of older cartoons where a cartoon character being hit on the head with a hammer would go […]
- squeeze page
In Internet and online advertising vernacular, a squeeze page is a Web page that contains information that would interest the marketer’s targeted readers. Squeeze pages are designed to obtain a reader’s name and e-mail address information by encouraging users to opt-in to an e-mail list to receive more information about the topic. Marketers will collect […]
(1) In programming, a special type of data structure in which items are removed in the reverse order from that in which they are added, so the most recently added item is the first one removed. This is also called last-in, first-out (LIFO). Adding an item to a stack is called pushing. Removing an item […]
- Staging Server
A server used as a temporary stage to test new or revised Web pages before they are made live.
Refers to a device that is self-contained, one that does not require any other devices to function. For example, a fax machine is a stand-alone device because it does not require a computer, printer, modem, or other device. A printer, on the other hand, is not a stand-alone device because it requires a computer to […]