One of the main ways to compromise internet security on your PC is via a program called a Trojan Horse. A Trojan Horse is a program that quietly runs in the background, inviting the user to run it, while spreading its malicious code. This code can do any number of things. It can start right away or it may simply install a program that won’t start for sometime. Once it does start, it can delete all of the files on the computer or it can infect the computer and try to infect other computers on the network. There are a number of ways spyware is delivered, and as a Trojan horse is the most common.
In addition to these things, spyware may infect your e-mail address book. Once this occurs, spam will be sent to every single person in every single infected address book.
The major difference between spyware like Gator and most other spyware programs is that users are understandably notified of its download before it actually occurs.
Another significant spyware threat is CoolWebSearch. This spyware can do a number of things to compromise your internet security. First, it can take over your current internet settings, making things display wrong, and causing...