Spyware, Adware, etc. -- Terms and Common Sense

When reading an article where some term is used often, it is useful to make sure the author of the article and you mean the same. Not surprisingly for those who still remember English lessons at school, every noun ending with "ware" is a mixture of objects having something in common--usually used for similar purposes. So it tends to be when "ware" is short for "software"; sometimes it's pretty tricky to define exactly what kind of software it includes and what these programs do.

If the terms "adware" and "spyware" are used in an article as synonyms (sometimes even experienced journalists make such a mistake), readers will just wonder why there are so many words for the same stuff. Since computer programmers and gurus don't read these articles at all, an average user feels bewildered when he finishes reading. Too many terms with too vague meanings?it's nothing more than my own impression, because I am not a programmer or a guru--just a linguist. I'm still trying to make a head and tail of it.

Spyware, adware, malware, what else? ? trackware, trapware, crapware, junkware, snoopware? Readers have heard a lot about browser hijackers, dialers, keyloggers, cookies, BHOs, Trojan horse programs, viruses, worms?What a motley crew! Is it possible for the average non-tech person to memorize their numerous definitions and knotty relations with one another? What is a part of which? If one looks trough several definitions of "spyware" given in some articles, he is going to find muddle and confusion instead of clarity.

Well, let's use common sense. Fortunately, it is sometimes easy to guess from the type of a program what such programs actually do--so, let' try. A browser hijacker is software that hijacks browsers (and does some other nasty things). Correct. A keylogger is software that logs keystrokes (ditto). Exactly.

Adware is software used for targeted advertising. Well, yes. There must be as many types of programs as there exist methods of advertising. Pop-up flood is also method of advertising. Is hijacking a browser also an approach to advertising? If it is so, creators of those annoying browser hijackers have somehow perverted logic.

And what about tracking potential customers? It is exactly the point where "adware" and "spyware" meet. People also tend to call all unwanted software "spyware" because these programs are installed without users' consent. But?nobody has ever wanted any advertising in print or on TV. Will you watch an ads-only channel? Will you buy an ads-only magazine? Online advertising just follows the tendency (sometimes going too far) to get exposure, to make a user notice ads-- at all cost.

Is spyware software used for spying, as one may deduce from the name? Yes and no. If software collects information and transmits it, such a program is automatically called "spyware" no matter how valuable this information is. That is why keyloggers (programs specially created for capturing key strokes) and cookies are both called "spyware". Well, if cookies and BHOs are kinds of spyware-- then a unicycle and roller skates are vehicles. When calling some kind of programs "spyware" we should at least consider what they "steal" and how this information is used.

Other terms are also pretty indistinct, though sometimes amusing.

Terms like " crapware" and "junkware" aren't very good, they just show attitude to such software instead of meaning anything clear.

"Malware" is too broad and too general. If one hears that some software is called malicious, he has no idea about what kind of software it is. Dividing software into malicious and benign is like dividing all, say, plants just into eatable and uneatable.

As for viruses, worms and Trojan horse programs, this fauna (not paying a slightest attention to the laws of biology) has already made up such hybrids with one another that no genetic engineer could probably dream about. Programmers say that there are almost no such viruses, worms or Trojans as they used to be only several years ago. These terms might become obsolete pretty soon because of this "evolution".

"Trojan horse" is pretty elegant term, by the way -- there is a clear idea of something benign-looking with some potentially dangerous core inside. Makes people remember history, Ancient Greeks and Homer.

All these may seem amusing for a philologist and make a good material for a linguistic study, but for an average PC user who would like to know what exactly his anti-spy software protects against, it is still a confusing mess of terms.

Alexandra Gamanenko currently works as a PR manager at the Raytown Corporation, LLC--an independent software developing company. website http://www.anti-keyloggers.com

In The News:


pen paper and inkwell


cat break through


Blind CC (Bcc): Master Its Use When E-Mailing

If you use Microsoft Outlook (or similar applications) for e-mailing,... Read More

Windows Screensavers Explained

In this article you will find some background information about... Read More

MySQL for Beginners ? How to Create a MySQL Database

Whether you are an experienced web programmer or a complete... Read More

Microsoft Business Solutions Customization Options - Overview for Programmer

Several years ago Microsoft purchased Great Plains Software, then Navision... Read More

Can You Calculate Complex Financial Calculations?

Are you a whiz at calculating financial information? Not the... Read More

MSN Messenger Is A Sweet Way To Communicate

MSN messenger is a pretty cool invention. I mean I'm... Read More

Basic Tips and tricks for Windows XP

Running Applications in Compatibility Mode With Windows XP, you can... Read More

Not All Project Management Software is Created Equal

The purpose of Project Management Software is to provide an... Read More

Microsoft Great Plains: Offshore Customization & Development ? Overview for Consultant

When you visit department stores and see that majority of... Read More

Lotus Domino/Notes - Microsoft Great Plains Tandem as ERP with Documents Workflow - Overview for IT

Lotus Domino/Notes ? Microsoft Great Plains tandem as ERP with... Read More

Microsoft Great Plains Multicurrency ? Overview For Implementation Consultant

When you first think about multicurrency ? you probably have... Read More

Linux ? Keyboard Or Mouse

Just stress testing one of the latest Linux distributions. Been... Read More

Microsoft Office Selecting Secrets

Stop the Runaway MouseWhat's the "runaway mouse?" You've seen it...you... Read More

Performance Tuning of a Daffodil DB / One$DB -JDBC Application

This article illustrates the best practices to improve the performance... Read More

These Items Are A Must Before Making The Decision To Purchase Any Off-The-Shelf Software

1. What determines the software price? Is it Per Seat... Read More

Computer Based Language Development and Spell-checking

Language development computer: Computer-based method for aiding language development seems... Read More

Microsoft CRM Customization Secrets ? Second Edition

This article is for advanced Microsoft CRM SDK C# developers.... Read More

Screenplay and Script Writing Software

When it comes to screenplay software each screenwriter needs to... Read More

The Opera Alternative

Security flaws have long plagued Internet Explorer (IE), the market-dominating... Read More

Fundraising Software ? How Can That Help Me?

Fundraising software lets you connect with donors in a way... Read More

Programming Language Migration Path

While I was preparing some personal background information for a... Read More

5 Mac Security Tips You Can?t Live Without

So, you've bought a new Macintosh, and now you may... Read More

Mozilla Vs. Firefox

For those who are unclear on the differences between the... Read More

Navision Attain Database access via C/ODBC in ASP.NET Application

Navision Software was purchased by Microsoft and now it is... Read More

Troubleshoot Windows with Task Manager

Task Manager is a Windows system utility that displays thetasks... Read More

Microsoft Great Plains Accounting/ERP Implementation ? Finance Industry Customization Example

Microsoft Business Solutions Great Plains is very generic accounting application... Read More

Behave, Word, Behave!

If you copy something from a Web site or elsewhere...... Read More

Microsoft CRM Implementation ? Fundamental CRM Principles Revision

Microsoft CRM is relatively new player on the now becoming... Read More

Free Microsoft Word Online Training Tutorial Resources

Microsoft Word is one of the most popular office applications... Read More

Passwords Used In Microsoft Word Documents

You would like to protect your documents, wouldn't you? Reasons... Read More

Making The Decision To Automate Your Software Testing

Not every software testing project can or should be automated.... Read More

SSH (SCP) Send Files from Windows to Your Linux Box

Not all of us have the luxury of working both... Read More

Microsoft Great Plains Security Setup - Overview For Consultant

Microsoft Business Solutions Great Plains is very good fit for... Read More