Understanding the Risk of Malware
Malware (as described in Chapter 2), is commonly spread in several different ways:
Included with legitimate software. Malware is often bundled with legitimate software. For example, a peer-to-peer file transfer application might include potentially unwanted software that displays advertisements on a user’s computer. Sometimes, the installation tool might make the user aware of the malware (though users often do not understand the most serious compromises, such as degraded performance and compromised privacy). Other times, the fact that unwanted software is being installed might be hidden from the user (an event known as a non-consensual installation). Windows Defender, as described later in this chapter, can help ...
Get Windows Vista® Resource Kit, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.