{"title":"既然我们都受过良好的间谍软件教育,我们能把坏人赶出这个行业吗?","authors":"Karen McDowell","doi":"10.1145/1181216.1181269","DOIUrl":null,"url":null,"abstract":"The phenomenon known variously as spyware, adware, or malware has grown exponentially in the past few years and has been swamping our computer systems, much like email spam but significantly worse in every sense of the word.Complicating the matter, the line between viruses and spyware is rapidly blurring, largely because of the increasing sophistication of this spyware and the multiplication of \"bots.\" While it is possible that university students are even more susceptible than the general public, it is certainly true that this is a serious national problem.Learning to identify and remove these insidious files is a critical step in securing computers and networks and in enabling faculty, staff, and students to complete their work safely and efficiently.","PeriodicalId":131408,"journal":{"name":"Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries","volume":"113 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Now that we are all so well-educated about spyware, can we put the bad guys out of business?\",\"authors\":\"Karen McDowell\",\"doi\":\"10.1145/1181216.1181269\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The phenomenon known variously as spyware, adware, or malware has grown exponentially in the past few years and has been swamping our computer systems, much like email spam but significantly worse in every sense of the word.Complicating the matter, the line between viruses and spyware is rapidly blurring, largely because of the increasing sophistication of this spyware and the multiplication of \\\"bots.\\\" While it is possible that university students are even more susceptible than the general public, it is certainly true that this is a serious national problem.Learning to identify and remove these insidious files is a critical step in securing computers and networks and in enabling faculty, staff, and students to complete their work safely and efficiently.\",\"PeriodicalId\":131408,\"journal\":{\"name\":\"Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries\",\"volume\":\"113 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-11-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1181216.1181269\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1181216.1181269","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Now that we are all so well-educated about spyware, can we put the bad guys out of business?
The phenomenon known variously as spyware, adware, or malware has grown exponentially in the past few years and has been swamping our computer systems, much like email spam but significantly worse in every sense of the word.Complicating the matter, the line between viruses and spyware is rapidly blurring, largely because of the increasing sophistication of this spyware and the multiplication of "bots." While it is possible that university students are even more susceptible than the general public, it is certainly true that this is a serious national problem.Learning to identify and remove these insidious files is a critical step in securing computers and networks and in enabling faculty, staff, and students to complete their work safely and efficiently.