Upload
quentin-hamilton
View
218
Download
1
Tags:
Embed Size (px)
Citation preview
Stuart Bannerman
Child SafetyCyberbullying
cyberbullying information
Predatory adultsChild Exploitation and Online Protection Centre
Offensive material
Advice on protecting children from inappropriate material
MalwareVirusesWormsTrojansRootkitsSpywareAdwareCrimeware
VirusesComputer programs that can reproduce
themselves and infect computersAttach themselves to existing programsHave to be activated by computer userCause ‘unexpected, usually negative, events’
WormsReproduce themselves automaticallyNo user activation requiredCan disable services on the computer
TrojansNon-replicatingLooks like something usefulOnce installed, allows others access to your
computer
RootkitsProgram designed to conceal malware
SpywareCollects information about userCan change browser home pageCan disable services
AdwareSoftware that displays adverts, with or
without consent
Software that displays adverts, with or without consentWell-known adware programs/programs distributed with adware
180SearchAssistant AOL Instant Messenger Ask.com Toolbar (Toolbar is automatically installed with many
different programs, even after you uncheck Ask.com during the installation process.)
Bearshare Bonzi Buddy ClipGenie Comet Cursor Crazy Girls Cydoor Daemon Tools - (Software comes bundled with the "Daemon Tools
WhenUSave Toolbar" but can be unchecked during installation)
DivX DollarRevenue eBike Insurance eCar Insurance eVan Insurance Ebates MoneyMaker ErrorSafe Evernote FaceGame.exe Foxit PDF Reader FlashGet Gamespy Gamevance
Gator Gool.exe Kazaa Kiwee Toolbar Messenger Plus! Live - (Software comes bundled with adware, but
can be unchecked during installation) MessengerSkinner Mirar Toolbar Oemji Toolbar PornDigger! Smiley Central Spotify - (A subscription can be paid to remove ads.) Tribal Fusion Viewpoint Media Player VirusProtectPro Vuze WeatherBug WhenU WinAce (now with MeMedia AdVantage) Windows Live Messenger Winzix Yahoo! Messenger Zango Zango Toolbar Zwinky
CrimewareDesigned to steal identityThen takes funds or carries out unauthorised
transactionsNorton has a specific tool to detect it
Card fraudAdvice on avoiding card fraud
PhishingMasquerading as financial institution in order
to obtain account details
Consumer affairsCitizens Advice produce guides to your rights
when buying on-line
Citizens Advice factsheet on buying over the web
Citizens Advice factsheet on buying on auction sites
SpamSpam is unsolicited (junk) emailIt is usually directed into a special folder