Spyware, Adware, etc. -- Terms and Common Sense

When reading an article where some term is used often, it is useful to make sure the author of the article and you mean the same. Not surprisingly for those who still remember English lessons at school, every noun ending with "ware" is a mixture of objects having something in common--usually used for similar purposes. So it tends to be when "ware" is short for "software"; sometimes it's pretty tricky to define exactly what kind of software it includes and what these programs do.

If the terms "adware" and "spyware" are used in an article as synonyms (sometimes even experienced journalists make such a mistake), readers will just wonder why there are so many words for the same stuff. Since computer programmers and gurus don't read these articles at all, an average user feels bewildered when he finishes reading. Too many terms with too vague meanings?it's nothing more than my own impression, because I am not a programmer or a guru--just a linguist. I'm still trying to make a head and tail of it.

Spyware, adware, malware, what else? ? trackware, trapware, crapware, junkware, snoopware? Readers have heard a lot about browser hijackers, dialers, keyloggers, cookies, BHOs, Trojan horse programs, viruses, worms?What a motley crew! Is it possible for the average non-tech person to memorize their numerous definitions and knotty relations with one another? What is a part of which? If one looks trough several definitions of "spyware" given in some articles, he is going to find muddle and confusion instead of clarity.

Well, let's use common sense. Fortunately, it is sometimes easy to guess from the type of a program what such programs actually do--so, let' try. A browser hijacker is software that hijacks browsers (and does some other nasty things). Correct. A keylogger is software that logs keystrokes (ditto). Exactly.

Adware is software used for targeted advertising. Well, yes. There must be as many types of programs as there exist methods of advertising. Pop-up flood is also method of advertising. Is hijacking a browser also an approach to advertising? If it is so, creators of those annoying browser hijackers have somehow perverted logic.

And what about tracking potential customers? It is exactly the point where "adware" and "spyware" meet. People also tend to call all unwanted software "spyware" because these programs are installed without users' consent. But?nobody has ever wanted any advertising in print or on TV. Will you watch an ads-only channel? Will you buy an ads-only magazine? Online advertising just follows the tendency (sometimes going too far) to get exposure, to make a user notice ads-- at all cost.

Is spyware software used for spying, as one may deduce from the name? Yes and no. If software collects information and transmits it, such a program is automatically called "spyware" no matter how valuable this information is. That is why keyloggers (programs specially created for capturing key strokes) and cookies are both called "spyware". Well, if cookies and BHOs are kinds of spyware-- then a unicycle and roller skates are vehicles. When calling some kind of programs "spyware" we should at least consider what they "steal" and how this information is used.

Other terms are also pretty indistinct, though sometimes amusing.

Terms like " crapware" and "junkware" aren't very good, they just show attitude to such software instead of meaning anything clear.

"Malware" is too broad and too general. If one hears that some software is called malicious, he has no idea about what kind of software it is. Dividing software into malicious and benign is like dividing all, say, plants just into eatable and uneatable.

As for viruses, worms and Trojan horse programs, this fauna (not paying a slightest attention to the laws of biology) has already made up such hybrids with one another that no genetic engineer could probably dream about. Programmers say that there are almost no such viruses, worms or Trojans as they used to be only several years ago. These terms might become obsolete pretty soon because of this "evolution".

"Trojan horse" is pretty elegant term, by the way -- there is a clear idea of something benign-looking with some potentially dangerous core inside. Makes people remember history, Ancient Greeks and Homer.

All these may seem amusing for a philologist and make a good material for a linguistic study, but for an average PC user who would like to know what exactly his anti-spy software protects against, it is still a confusing mess of terms.

Alexandra Gamanenko currently works as a PR manager at the Raytown Corporation, LLC--an independent software developing company. website http://www.anti-keyloggers.com

In The News:


pen paper and inkwell


cat break through


Microsoft Great Plains customization ? Freight Forwarding/Transportation industry example

Microsoft Business Solutions Great Plains version 8.5, 8.0, 7.5, Great... Read More

Dont Choose Adobe When Working With PDF

While Adobe is the most known maker of PDF tools,... Read More

Microsoft Great Plains: Customization Upgrade & Recovery ? Visual Studio VB 6.0

Microsoft Great Plains, former Great Plains Software Dynamics, eEnterprise has... Read More

7 Things to Consider Before Buying Small Business Accounting Software

The world of small business accounting software can be a... Read More

International Support - Microsoft Great Plains VAR/Partner Selection ? Overview for V.P. IT

Looks like Microsoft Great Plains becomes more and more popular,... Read More

Microsoft C# vs. VB.Net

Hi, Guys,I believe a lot of programmers are trying to... Read More

Information Products: A Business Owners Best Friend

We live in a post-industrial age where information is the... Read More

Change Your Word Docs in Record Time!

Anyone who has ever used Microsoft Word knows that it... Read More

Accounts Payable: A Powerful Document Management and Workflow Solution

Accounts payable is just one area of office management where... Read More

Basic Steps To Optimize Your Internet Security

After seeing many people complain about their weak Internet security... Read More

Corporate ERP: Microsoft Great Plains For The Plant In Brazil ? Overview For CIO

Microsoft Business Solutions Great Plains as new ERP for multinational... Read More

Best Practices In Choosing Network Monitoring Software

Blue Cross and Blue Shield of Hawaii (HMSA) found itself... Read More

Who Is Minding Your Sensitive Data?

Stealing company information used to be the specialty of spies... Read More

How to Make Own CMS

Every day millions of new web documents emerge on the... Read More

How a Bug Challenges to a Software Professional

It is really interesting that a bug can create problem... Read More

Upgrading Great Plains Dexterity Customization ? switching to new technologies: SQL, Crystal, eConne

1. Replace Dexterity cursor with SQL Stored Procedure Dexterity... Read More

Partitioning, Formatting and Reinstalling in Windows 98

Formatting and reinstalling windows 98 is very easy if you... Read More

Data Quality Best Practices for Salesforce.com

Executive SummaryAn effective plan for entering, cleaning and updating the... Read More

Spyware Statistics -- Whats New in May 2005?

Although statistics often is blamed for various deadly sins --... Read More

Microsoft Great Plains Subcontracting ? Overview for Microsoft Business Solutions Partner

Microsoft Business Solutions Great Plains is very popular ERP/MRP applications... Read More

The Hidden Power of Online Manual

Writing software manuals is boring, isn't it? We often think:... Read More

Microsoft CRM: Data Conversion ? Import from Act!

Best Software Act! is very popular CRM for small and... Read More

Microsoft Business Solutions Partner ? How to Launch New IT Consulting Practice

In the new era of internet marketing the problem of... Read More

Free Preventive Maintenance Software

While several preventive maintenance software manufacturers offer free trials for... Read More

The True Meaning of Freeware

The vast majority of us will have, at some point,... Read More

Examining the Substance of Studio MX

To all web designers out there, this article is for... Read More

Navision Attain C/ODBC Crystal Report ? Customization Example

Microsoft Business Solutions Navision is main ERP application for European,... Read More

Reporting for Microsoft Great Plains/Dynamics/eEnterprise: RW ? ReportWriter ? Tips for Developer

Microsoft Business Solutions Great Plains is written in Great Plains... Read More

Free PDF Publishing Software

In a previous article, I wrote about OpenOffice... Read More

Microsoft Great Plains: Offshore Customization & Development ? Overview for Consultant

When you visit department stores and see that majority of... Read More

Is Your Small Business Ready For A CRM Software Solution?

I have yet to see a business that, sometimes in... Read More

Microsoft Great Plains Project Accounting ? Overview For IT Director/Controller

Microsoft Business Solutions is now in process of creating so... Read More

Great Plains Dexterity: Customizations & Source Code Programming

Great Plains Software Dynamics, Dynamics C/S+, eEnterprise were written on... Read More