Investigating Spyware in Peer-to-Peer Tools

作者: Martin Boldt , Johan Wieslander

DOI:

关键词:

摘要: Peer-to-Peer (P2P) tools are used exclusively when their users connected to the Internet, thus constituting a good foundation for online commercials help finance further tool development. Although software that displays ads (adware) is very common, activity monitoring or information collecting spies on (spyware) may be installed together with P2P tool. This paper will present method examining installations and test results from few of most common tools. It also discuss whether these tools, bundled software, make any privacy intrusions. Finally, itself evaluated suggestions refinements proposed.

参考文章(9)
David G. Korn, Porting UNIX to windows NT usenix annual technical conference. pp. 4- 4 ,(1997)
C.P. Shelton, P. Koopman, K. Devale, Robustness testing of the Microsoft Win32 API dependable systems and networks. pp. 261- 270 ,(2000) , 10.1109/ICDSN.2000.857548
Michael J. Karels, Keith Bostic, Marshall Kirk McKusick, John S. Quarterman, The Design and implementation of the 4.3BSD UNIX operating system ,(1991)
Dieter Gollmann, Computer Security ,(1999)