October 2009
Intermediate to advanced
1760 pages
93h 25m
English
Malware (as described in Chapter 2) is commonly spread in several different ways:
Included with legitimate software Malware is often bundled with legitimate software. For example, a peer-to-peer file transfer application might include potentially unwanted software that displays advertisements on a user’s computer. Sometimes, the installation tool might make the user aware of the malware (although users often do not understand the most serious compromises, such as degraded performance and compromised privacy). Other times, the fact that unwanted software is being installed might be hidden from the user (an event known as a non-consensual installation). Windows Defender, as described later in this chapter, can help ...