![ACRONIS PRIVACY EXPERT CORPORATE - User Manual Download Page 38](http://html1.mh-extra.com/html/acronis/privacy-expert-corporate/privacy-expert-corporate_user-manual_2841332038.webp)
Spyware threats glossary
38
Copyright © Acronis, Inc., 2000-2005
Appendix A.
Spyware threats glossary
This glossary contains supplemental information on the most popular spyware from
which Acronis Privacy Expert Corporate protects your organization computers.
Adware
This is a kind of Web marketing where banners are integrated into freeware and
shareware programs. To be able to use a program, a user has to watch ads
downloaded from the Web. This increases traffic volume and slows down your
Internet connection.
Browser Helper Objects
Some Browser Helper Objects are useful at expanding your browser’s
capabilities, but there are others that might not need your permission to install
on your computer and that can be used for malicious purposes, such as
gathering information on your Web surfing habits. This can cause problems
ranging from incompatibility issues to corrupting important system functions,
making these objects not only a threat to your security, but also to your system’s
stability.
Browser hijackers
Browser hijackers have the ability to change your Internet browser settings,
redirect your Web searches through their own search engines, redirect mistyped
or incomplete URLs, and change your default home page. They can redirect your
searches to "pay-per-search" Web sites or pornographic Web sites.
Commercial keylogger
Keyloggers register which keys are pressed on a user’s PC and transmit this
information via e-mail. Such applications can also store the time of running or
quitting any applications. They can operate without the users’ knowledge.
Dialers
Dialers have the ability to disconnect your computer from your local Internet
provider and reconnect you to the Internet using an alternate connection, such
as an expensive pornographic, toll or international phone number. They do not
spy on you but they can rack up significant long-distance phone charges. They
have the ability to run in the background, hiding their presence.