What is rogue software?
"Rogue software" is software between viruses and regular software.
Computer virus refers to a kind of program that has or causes other programs to destroy system functions, endanger user data or other malicious behaviors. This kind of program usually affects the use of the computer and copies itself.
Regular software refers to the software developed and released to the public to facilitate users to use computers for work and entertainment.
"Rogue software" is somewhere between the two, with normal functions (downloading, media playing, etc. ) and malicious behavior (advertising, opening the back door), bringing substantial harm to users.
Classification of rogue software
According to different characteristics and hazards, rogue software that plagues computer users mainly includes the following categories:
1, Adware
Definition: Adware refers to downloading and installing on the user's computer without the user's permission; Or a program that is bundled with other software and seeks commercial benefits through pop-up advertisements.
Hazard: This kind of software is often forced to install and cannot be uninstalled; Collecting user information in the background for profit and endangering user privacy; Pop-up advertisements often consume system resources and slow down its running speed.
For example, after a user installs a downloaded software, a window with advertising content will always pop up, which will interfere with normal use. There are also some software that will add advertising icons unrelated to their functions in the toolbar of IE browser after installation, which is difficult for ordinary users to remove.
2.spyware
Definition: Spyware is a kind of software that can install a back door on a user's computer and collect user information without the user's knowledge.
Hazard: Users' private data and important information will be captured by "backdoor programs" and sent to hackers, commercial companies, etc. These "backdoor programs" can even allow users' computers to be remotely controlled, forming a huge "botnet", which is one of the important hidden dangers of current network security.
For example, some software will obtain the user's hardware and software configuration and send it out for commercial purposes.
3. Browser hijacking
Definition: Browser hijacking is a malicious program that tampers with the user's browser through browser plug-ins, BHO (Browser Assistant Object), Winsock LSP, etc. , causing the user's browser configuration to be abnormal and forced to direct to commercial websites.
Hazard: Users will be forced to install such plug-ins when browsing websites, and ordinary users can't uninstall them at all. After being hijacked, users will be forced to guide to their designated websites as long as they surf the internet, which seriously affects normal online browsing.
For example, some bad websites will pop up installation windows frequently, forcing users to install a browser plug-in, or even asking for users' opinions at all, and using system vulnerabilities to force them to install on users' computers in the background. The plug-in also uses non-standard software writing technology (usually used by viruses) to avoid user uninstallation, which often leads to browser errors and abnormal system restart.
4, behavior record software (Track Ware)
Definition: Behavior recording software refers to software that steals and analyzes users' private data without users' permission, and records users' personal behaviors such as computer usage habits and surfing habits.
Harm: it endangers the privacy of users and may be used by hackers for online fraud.
For example, some software will record and analyze the websites visited by users in the background, and some will even send them to specialized commercial companies or institutions, which will spy on users' interests and conduct corresponding advertising promotion or commercial activities accordingly.
5. Malicious software sharing.
Definition: Malicious * * * software refers to some * * * software, which forces users to register by deception, trial and error in order to obtain benefits. , or bind all kinds of malicious plug-ins in the software body and install them on the user's machine without permission.
Danger: Use "trial trap" to force users to register, otherwise personal data and other data may be lost. Software integration plug-ins may cause users' browsers to be hijacked and their privacy stolen.
For example, after installing a certain media playback software, users will be forced to install software (search plug-ins, download software) unrelated to the playback function without giving a clear prompt; And the user will not automatically uninstall these extra installed software when uninstalling the player software.
Another example is encryption software. After the probation period, all encrypted data will be lost. Only by paying for the software can the lost data be retrieved.
6. Others
With the development of the network, the classification of "rogue software" is becoming more and more detailed, and some new types of rogue software are constantly appearing, and the classification standards are bound to be adjusted accordingly.
More people don't like Yahoo Assistant software not because of its functional problems, but because of its promotion mode, mandatory installation and bundled installation, which can't be uninstalled.
On September 13, 2005, Microsoft defined 372 1 as a virus in its anti-spyware software, and then Yahoo China handled the upcoming public relations crisis very quickly. On September 15, a new software called "Yahoo Internet Assistant" was launched, which replaced 372 1 and was used in Yahoo China and Yahoo!
Liu Fei, the product economy of Yahoo China, said in an interview: "372 1 does have some problems such as being difficult to completely uninstall, but the 5438+00 Yahoo Assistant launched in June 2005 focuses on helping users completely get rid of network harassment and protecting users' privacy and safety, with more prompts during installation and convenient uninstallation. "The fact is that neither 372 1 nor Yahoo Assistant can be uninstalled cleanly. So many rogue software cleaning programs in China are proud of deleting Yahoo Assistant. If Yahoo Assistant can be uninstalled cleanly, where do so many online users complain that they can't be uninstalled? Is the author of the rogue software cleaner out of his mind? Do you want to start the uninstallation program for the uninstallable software? Facts have proved everything, Yahoo Assistant can't clean up and uninstall.
The worst time for rogue software is that Yahoo China officials have no intention to admit the nature of Yahoo Assistant rogue software. The official claimed: "Yahoo Assistant was not installed maliciously. Most of the victims installed Yahoo Assistant, Yahoo, because they pressed Enter by mistake.
The active installation rate of assistants has reached 40%. "In other words, 60% of users of Yahoo Assistant were forced to install Yahoo Assistant reluctantly. In 2005, there were a little over 654.38 billion netizens in China, and now I have 654.38 billion. Official website, Yahoo's assistant, claims that 70% of netizens choose to use Yahoo's assistant, which is rare. On second thought, 60% people don't want to install Yahoo Assistant, but they are still using the instruction manual. A few people think that Yahoo's function is acceptable, and most people are forced to use it because they can't uninstall it.
No matter in the era of 372 1 or in the era of Yahoo Assistant, the two companies did not admit the harm that rogue software brought to netizens or apologize to them. So Yahoo's assistant deserves to be scolded, just like a puppy going to the Yasukuni shrine toilet. It says that Japan used to be bad, but now it's good.
It's different now. I promise not to visit the shrine in August 15 this year. How many people can believe a puppy? Similarly, Yahoo's assistant said: In the past, 372 1 could not be uninstalled, but now I have released version 3.0, which is guaranteed to be uninstalled. In that case, how many people will believe it 3.0 can be uninstalled, which means it can't be uninstalled before 1.0 and 2.0?
Yahoo's assistant also offended its company. China Yahoo only refuted 372 1 after the list of 10 rogue software was named by Beijing Network Industry Association, but did not refute the "search toolbar" of the same company. Do you mean Yahoo?
China itself admitted that its "search toolbar" was rogue software. If so, Yahoo China admitted to launching rogue software. Yahoo China also supports the spread of pirated software. If it is normal to bundle genuine software, what is the Yahoo assistant bundled in the pirated XP of Tomato Garden? Yahoo assistant added another charge, supporting piracy! If Yahoo's assistant is not a rogue, why should he send a lawyer's letter to the super rabbit author, accusing the super rabbit of maliciously deleting posts? Why not blame Microsoft? Can't the Add/Remove program in Microsoft Control Panel delete Yahoo Assistant at the same time? In fact, conventional methods can't delete Yahoo Assistant normally and cleanly, especially from "Add/Remove Programs", but some excellent rogue software deletion programs have done this well, which has caused the unhappiness of rogue software publishers.
To sum up, what reason do we have not to dislike Yahoo Assistant?
It's rogue software, maliciously bundled and installed.
1, the moral analysis of Yahoo Assistant and Yahoo Assistant
Forcibly implant other program modules without explicit notice.
System-driven loading cannot avoid safe mode. Even Windows provides users with the security mode with network connection as a separate project, while Yahoo Assistant is indiscriminate. Whether the user uses the network or not, loading is not negotiable!
2. Legal analysis of Yahoo Assistant and Yahoo Assistant.
The extra installation program violates the right to know;
During the uninstallation process, cheat and keep the module without user's permission, and cross-repair;
Automatic infection, automatic transmission, self-hiding, occupying system resources, interfering with users' online activities, directly or indirectly bringing bad data into the system, being extremely difficult to clear, and automatically loading through various channels ... have complete virus characteristics.
Of course, if you simply install it, he won't torture you. But all your secrets will be made public to Yahoo assistants. If you don't care, that's fine. At that time, if you had online banking and your money was lost, it can be said that you had no evidence to accuse Yahoo Assistant. The bank will also shirk, saying that you didn't keep the password well.
At this time, you can cry.
In other words, Yahoo Assistant can master all the privacy on your computer.
He will send your online information to their database and get some strange things into your computer, which is very troublesome. Delete it quickly. Yahoo has its own virus, and there are many IE viruses. My friend somehow installed Yahoo, which almost caused him to reinstall the system. The webpage is too big to open, and QQ can't get on. You'd better uninstall it just in case. Then the next Trojan killed the guest and killed Yahoo's own virus!
Unloading it, I found that its advantages outweigh its disadvantages, so it is safe to unload it! !
We can work normally without him! !