What Is the Difference between Adware and Malware?

"Rogue software" is software between viruses and regular software. If there is rogue software in the computer, the following situations may occur: When the user uses the computer to access the Internet, a window will pop up continuously; the computer browser is modified inexplicably and many work bars are added; when the user opens the web page, the web page will become unavailable. Related strange pictures, even yellow ads.

"Rogue software" is software between viruses and regular software. If there is rogue software in the computer, the following situations may occur: When the user uses the computer to access the Internet, a window will pop up continuously; the computer browser is modified inexplicably and many work bars are added; when the user opens the web page, the web page will become unavailable. Related strange pictures, even yellow ads.
Some rogue software is just for some purpose, such as advertising. Although these rogue software will not affect the normal use of the user's computer, an additional web page will pop up when the user starts the browser to achieve the purpose of publicity.
Chinese name
Rogue software
Foreign name
rogue software
Category
software
Features
Difficult to uninstall
Alias
Adware, malware

Rogue Software Word Origins

"Rogue software" originates from the word "Badware" in foreign countries. On the famous website, the definition of "Badware" is: it is a way to track your online behavior and feedback your personal information to "hidden in the dark" Market interest group software, and they can pop you up with ads through this software. "Badware" is divided into "spyware", "malware" and "deceptive adware". The domestic Internet industry generally refers to this type of software as "rogue software" and summarizes spyware , Behavior recording software, browser hijacking software, search engine hijacking software, adware, automatic dialing software, password theft software, etc. [1]
The biggest commercial use of "rogue software" is to distribute advertisements and form the entire gray industry chain: In order to increase registered users, increase traffic or promote products, companies purchase advertising window traffic from online advertising companies. Online advertising companies use their own control An ad plug-in program that forcibly pops up an ad window on the user's computer. And in order to let the advertising plug-in enter the user's computer inadvertently, most of the time, the advertising company is to contact the author of the popular free shareware, and bundle the advertising program through the plug-in to the free shareware for a few cents each time. In China, when users download and install these free shareware programs, advertising programs also take advantage of them.
It is said that the billing of online advertisements is carried out according to the number of pop-ups. The use of "rogue software" can pop up ads at will without the user's authorization at all, increasing the number of pop-ups of advertisements, thereby increasing advertising revenue. An advertising plug-in company with a large "installed capacity" has monthly revenue of more than one million yuan based on "rogue software".

Rogue Software Software Definition

Rogue software refers to software that infringes on the legitimate rights and interests of users without being explicitly prompted by the user or without the user's permission, but does not include computer viruses as required by Chinese laws and regulations. Software with one of the following characteristics can be considered rogue software: [2]
Definition of rogue software (rogue software): refers to software that is forcibly installed and run on a user's computer or other terminal without explicitly prompting the user or without the user's permission, infringing on the user's legitimate rights and interests, but has been provided for by Chinese laws and regulations Except computer viruses. It has the following characteristics:
Forced installation: refers to the act of forcibly installing software on a user's computer or other terminal without the user's explicit prompt or permission. Forced installation, the process cannot be ended during installation, the installation path cannot be selected, with a lot of pornographic ads or even computer viruses.
Difficult to uninstall: refers to the behavior that does not provide a universal uninstallation method, or that is still active or residual after uninstallation, without being affected by other software and caused by human damage.
Browser hijacking: Refers to the behavior of modifying the user's browser or other related settings without the user's permission, forcing the user to visit a specific website or preventing the user from accessing the Internet normally.
Advertisement pop-up: refers to the behavior of popping up advertisements such as pornographic advertisements using software installed on the user's computer or other terminals without the user's explicit prompt or permission.
Malicious collection of user information: Refers to the act of maliciously collecting user information without explicitly prompting the user or without the user's permission.
Malicious uninstallation: refers to the behavior of not uninstalling non-malware software without explicitly prompting the user, without the user's permission, or misleading and deceiving the user.
Malicious bundling: The act of bundling software that has been identified as malicious software.
Malicious installation: Force unauthorized installation of other non-supplied independent software on the user's computer without permission.
Note: The software that is forcibly installed on the system disk is also called rogue software.
Other malicious acts that violate users' right to know and choose.

Rogue Software Software Features

  1. Use a variety of social and technical means to force or secretly install , and resist unloading ;
  2. Forcibly modify user software settings, such as the homepage of the browser, software startup options, security options;
  3. Forcible pop-up advertisements or other behaviors that interfere with users or occupy system resources ;
  4. Potential factors or hidden dangers that infringe on user information and property security ;
  5. Jointly infiltrate users' computers with computer viruses;
  6. Disable anti-virus software or other computer management programs for further damage;
  7. Collect user personal information, secrets and privacy without the user's permission, or by using the user's negligence, or by using the user's lack of relevant knowledge;
  8. Malicious tampering with registry information;
  9. Threats intimidate or mislead users into installing other products. [2]

Rogue software software classification

According to different characteristics and hazards, the rogue software that plagues the majority of computer users mainly has the following categories:
1. Adware
Definition: Adware is a program that is downloaded and installed on a user's computer without the user's permission; or is bundled with other software to obtain commercial benefits through pop-up advertisements and other forms.
Harm: Such software is often forced to install and cannot be uninstalled; collecting user information in the background for profit, endangering user privacy; frequently popping up ads, consuming system resources, and making it run slower, etc.
For example, after a user installs a download software, a window with advertisement content will always pop up, which interferes with normal use. After some software is installed, advertisement icons that are irrelevant to their functions will be added to the toolbar of Internet Explorer, which is difficult for ordinary users to clear.
2. Spyware
Definition: Spyware is software that can install a backdoor on a computer and collect user information without the user's knowledge.
Harm: Users' private data and important information will be captured by "backdoors" and sent to hackers, commercial companies, etc. These "backdoor programs" can even enable users' computers to be remotely manipulated to form a huge "botnet", which is one of the important hidden dangers of network security.
For example: some software will obtain the software and hardware configuration of the user and send it for commercial purposes.
3 Browser hijacking
Definition: Browser hijacking is a malicious program that modifies the user's browser through browser plug-ins, BHO (browser auxiliary object), Winsock LSP, etc., making the user's browser configuration abnormal and being forcibly guided to business website.
Harm: Users will be forced to install such plug-ins when browsing websites. Ordinary users will not be able to uninstall them. After being hijacked, users will be forcibly directed to their designated websites as long as they are online, which will seriously affect normal Internet browsing.
For example: some bad sites frequently pop up installation windows, forcing users to install a browser plug-in, or even asking users for opinions, and using system vulnerabilities to force installation into the user's computer in the background. This plug-in also uses non-standard software writing technology (this technology is usually used by viruses) to avoid user uninstallation, which often causes browser errors and system restarts.
4 Behavior Recording Software (Track Ware)
Definition: Behavior recording software refers to software that steals and analyzes user privacy data, and records user behaviors such as computer usage habits and web browsing habits without the user's permission.
Harm: Endangers user privacy and may be used by hackers to conduct cyber fraud.
For example: some software will record the website visited by the user and analyze it in the background, and some will even send it to a special business company or agency, and such agency will snoop on the user's hobby according to this and carry out corresponding advertising or business activities .
5. Malicious shareware
Definition: Malicious shareware refers to some shareware that uses decoy methods, trial traps, and other methods to force users to register in order to obtain benefits, or bundles various malicious plug-ins in the software to install them on the user's machine without permission.
Harm: Use "trial traps" to force users to register, otherwise data such as personal data may be lost. Software-integrated plug-ins may cause the user's browser to be hijacked and privacy stolen.
For example: After installing a piece of media playback software, users will be forced to install software that has nothing to do with playback functions (search for plug-ins, download software) without giving a clear prompt; and users will not automatically uninstall these add-ons when uninstalling the player software Installed software.
Another example is some encryption software. After the trial period expires, all the encrypted data will be lost. Only by paying for the software can the lost data be recovered.
6. other
With the development of the network, the classification of "rogue software" is becoming more and more detailed. Some new types of rogue software are constantly appearing, and the classification standards will inevitably be adjusted accordingly.

The difference between rogue software and virus

A computer virus refers to a type of program that has or causes other programs to damage system functions, endanger user data, or other malicious behaviors. Such programs often affect computer use and can replicate themselves.
Formal software refers to software that is developed for the convenience of users using computers for work and entertainment and is released to the public.
"Rogue software" is somewhere in between, with both normal functions (downloads, media playback, etc.) and malicious behaviors (playing advertisements, opening backdoors), which brings substantial harm to users. These software may also be referred to as adware, spyware, and malicious shareware. Unlike viruses or worms, many of these softwares are not secretly written and distributed by small groups or individuals, but many well-known companies and groups are suspected of such software. The software uses a variety of technical means to forcibly install and combat removal. Many users complain that they were installed without their knowledge, and its multiple anti-uninstall and automatic recovery technologies make many software professionals feel difficult to deal with, so that their uninstallation has become a frequently discussed and consulted technology on mainland websites. problem.

Rogue Software Software Development

New rogue software may not be bundled with plugins
New hooliganism includes intentionally obstructing the use of other similar software
New rogue software forces it to install to system disk, users have no choice
New hooliganism includes describing his hooliganism as a bug, which has been covered up

Rogue software lawyers say

Huang Jinshen, a support lawyer of the Anti-Rogue Software Alliance, said that once the behavior of rogue software has become a crime, it should not be doubted that it should be handled in accordance with relevant provisions of the Criminal Law. But as far as its civil liability is concerned, China's legislation is still blank. Huang Jinshen believes that rogue software occupies the user's computer memory, slows down the CPU operation speed, and occupies the hard disk capacity, which has violated the user's property rights. But how to calculate the loss caused by infringement of property rights is a difficult problem.
Article 7 of the Consumer Protection Law of the People's Republic of China provides for the right of consumers to be protected from damage, Article 8 provides for consumers 'right to know, Article 9 provides for consumers' right to choose, and Article 10 provides for Article 11 provides consumers with the right to fair trade, and Article 11 provides for the right to compensation. If a computer user suffers property damage as a result of using rogue software, Articles 7 and 10 may obviously apply; if the rogue software is forcibly installed without the computer user s knowledge, or hijacks the browser, the eighth and the seventh may apply 9. Article 10. Huang Jinshen said that although the Consumer Rights Protection Law of the People's Republic of China provides a certain legal basis, the above legal provisions are not specifically designed for rogue software. Therefore, the society looks forward to the promulgation of regulations as soon as possible to restore the quietness of this huge market.

Rogue Software Governance Action

In June 2005, the Beijing Network Industry Association held the first seminar in China to prevent rogue software. Sixteen companies including Sina, Sohu, Netease, Rising, and Jiangmin drafted the "Convention on the Self-Regulation of Software Product Behavior Safety" after the meeting.
In July 2018, the National Computer Virus Emergency Response Center found that 10 illegal and harmful mobile applications existed in the mobile application publishing platform through Internet monitoring, reminding mobile phone users not to download these illegal and harmful mobile application software to avoid unnecessary operation of mobile phone operating systems. Security threat. [3]

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?