To: Rick Faurot who wrote (30070 ) 11/12/2002 2:06:58 AM From: mr.mark Read Replies (1) | Respond to of 110653 just some more fun <not> stuff running undetected in the background on many people's computers.... Usage tracks Usage tracks are your fingerprints in your system. Whenever you visit a page with your browser, or just open any file, that information is stored deep inside Windows. In most cases that is very useful – if you want to open that file again, you can select it from a list instead of typing the whole filename or browsing the whole directory structure again. But in some cases you may want to hide your activity, because spyware and internet attackers may use that information. Spybot-Search&Destroy can remove some of the most important and common tracks on your system.Keylogger The name keylogger was defined back in old DOS times, where computers where handled just by using a keyboard. The most basic keyloggers back from that time just log the keys you press. The spy, a person with physical access to your machine, could get that log at a later point and see everything you typed. Modern keyloggers are much improved. They do not only log the keys you press, but make also screenshots to show the spy what Windows you are working with, the capture information about your internet use, and much more. The spy doesn't even need physical access to your machine because many current keyloggers send their logs by mail.Browser hijacker A browser hijacker is a small program or registry setting that is responsible for changed IE start and search pages. If your browser starts with a different start page (one you haven't changed yourself), you most probably got hijacked. Intelligent hijackers do not only change these pages, but also add a small file that will restore the hijacked settings upon each system start. Hijackers often use ActiveX installation programs and/or security holes.Dialers [mark's note: i'm still trying to learn more about these little jewels, but to name a few...] A.I.S, Aconti, Action Liveshow Showtime, All-In-One Telcom, BillByCall, Central24, DialerFactory, EazyDial, HighSpeed Connector, InterFun, MainPean, Net900, QNET, StarLux, TSCash, TTW, VLoading, X-Diversecurity.kolla.de