logo

ANTI-SPY SOFTWARE.

   

Added on  2023-04-20

4 Pages352 Words272 Views
Running Head: ANTI-SPY SOFTWARE 1
IT WRITE UP
STUDENT’S NAME
COURSE
UNIVERSITY
DATE

ANTI-SPY SOFTWARE 2
Introduction
An anti-spyware software is specifically designed to detect and remove malicious programs that
install themselves in the computer (Sedighi & Ghahremani, 2015). It enable the user to remove
malware hiding in the PC or the user can also use them as anti-virus to prevent the installation of
spyware. These harmful programs usually install themselves on a computer without the
knowledge of the user. After installation the spyware software scrutinizes crucial data and
manipulate them. The anti-spyware software notifies the users of the existence of spyware giving
them a choice of removing them.
Common types of anti-spyware software.
They include: Avira free Antivirus, Emsisoft Anti-Malware, eScan Total Security Suite, Comodo
internet Security Suite, Malware bytes Premium Trial, Spy ware Terminator, Microsoft Safety
Scanner, McAfee Total Protection, AVG Antvirus Free and Avast Free Antivirus.
How they work
According to Ekanem (2016) these software protect the programs in the following ways as
outlined below
Scanning the hard disk
The protection program searches all the existing files in the computer’s hard drive for matches
eliminating unique software.
Memory and registry scans
The spyware software scans the computer memory and registry so as to detect the modifications
that have been made by the spyware fixing them.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
CHAPTER FIVE 4 Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Antiviruses. Ant
|14
|2481
|157

Securing Enterprise Infrastructure
|7
|1553
|24

Malware Analysis Assignment PDF
|29
|6377
|378

Enterprise Information and Security
|11
|2486
|224

Information Systems and Big Data Analysis for BSc Business Management Cohort 2 BMP4005
|11
|3390
|145

Understanding SQL Injection, Insider Attacks, and Malware Threats for Enhanced Cybersecurity
|7
|2711
|157