O'Reilly logo

Home Network Security Simplified by Nathan Clement, Neil Anderson, Jim Doherty

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Tip 5: Lock Out Spyware and Adware

Tip 5: Lock Out Spyware and Adware
<feature><title></title>

Threat Type: Software based, victim enabled

Examples of Threats:

  • Popping up advertisements all over your computer screen

  • Installing programs to collect and report data on your Internet browsing habits

  • Inserting toolbar or searchbar programs into your browser or applications, such as Internet Explorer, which slow down your computer’s performance

  • Collecting and reporting information about which websites you visit so that you can be targeted more effectively with advertisements and marketing

Our Tips:

  • Install and enable a popup blocker.

  • Install and enable a spyware/adware blocker.

  • Use ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required