"rogue software" originated from the word "badware" abroad, on the famous website, the definition of "Badware" is: It is a software that tracks your online behavior and feeds your personal information to the "hiding in the dark" market interest group, and they can use this software to pop up advertisements. "Badware" is divided into "spyware", malware (Malware) and deceptive Adware. Domestic Internet industry people generally refer to "rogue software", and summarizes spyware , Behavioral record software, browser hijacking software, search engine hijacking software, advertising software, automatic dialing software, theft password software, etc. The largest commercial use of "rogue software" is spreading advertisements, forming a whole Bar Gray Industry Chain: Enterprises to increase registered users, improve visits or sales products, to buy advertising window traffic to network advertising companies, using their own control advertising plug-in, to force pop up advertising windows in user computers. And to let The advertisement plug-in will not know that the ghosts enter the user's computer. Most of the advertising companies are bundled by using the authors of the hot free sharing software to bundle the advertising procedures into the free sharing software through the plugin. When downloading and installing these free sharing software, the advertising program will also be embarrassed.
is alleged that the billing of the online advertisement is carried out by the number of pop-ups, using "rogue software" can not authorize at the user. In the case of random popping, advertisement will raise the number of advertisements, and increase advertising revenue. A "installed capacity" advertising plug-in company, with "rogue software" monthly income of more than one million yuan.
rogue software means that the software is not clearly imposed on the user's computer or other terminals without explicitly prompting the user or without the user license, but does not include China's laws and regulations Computer virus. Software with one of the following features can be considered rogue software:
rogue software (rogue software) definition: means that in the case of not clearly prompting users or without user licensing, User computers or other terminals to install operations, violations of user legitimate rights and interests, except for computer viruses prescribed by China's laws and regulations. It has the following characteristics:
forced installation: Refers to the user without explicitly prompt users Or without user license, the behavior of the software is forcible on the user's computer or other terminal. Force installation, it cannot end its process when installing, and its installation path cannot be selected, with a large pornographic advertisement or even computer virus. < / p>
It is difficult to uninstall: refers to the universal uninstallation mode, or if it is not affected by other software, it is still active or residual procedure after uninstalling.
browser Hijacking: Indicates that users have been licensed, modify user browsers, or other related settings, forcing users to access specific websites or make users unable to access the network.
Advertising pop-up: Refers to not clearly prompt users or not users In the case of a license, the behavior of advertisement such as porn advertisement is used to install the software installed on the user's computer or other terminal.
malicious collection user information: refers to the user or Malicious collection of user information is not allowed by user permission.
malicious unloading: refers to the behavior of non-malware in uninstalled non-malware without explicitly prompting users, without user license, or misleading.
malicious bundle: Refers to behavior that is bundled in software has been identified as malware.
Malicious installation: Included without permission, forcibly installing other non-accompanied independent software in the user's computer.
Note: Forcibly mandatory software installed to the system disk is also called rogue software.
Other violation of the user's right to know, the choice of malicious behavior.
Adopting a variety of social and technical means, forced or secret installation , and Resist unloading ;
forcibly modifying user software settings, such as browser's homepage, software automatic start option, security option
Forced pop-up advertisement, or other interference users , occupying system resources behavior;
There is a potential or hidden danger of the infringement of user informationand property security ;
combined with computer viruses into user computers;
deactivated anti-virus software or other computer management program To make further damage;
is not licensed without user, or using user negligence, or uses the user's lack of related knowledge, secret collection user personal information, Secret and privacy;
malicious tamper registry information;
threatening intimidation or misleading users Install other products.
According to different characteristics and hazards, the rogue software of the majority of computer users has mainly used the following categories:
Definition: Advertising software means downloading and installed on user computers without user; or bundling other software, using pop-up advertisements, etc.
Hazard: Such software often enforces and uninstall; collect user information in the background, endanger user privacy; frequent pop-up advertisements, consume system resources, so that it will run slowly.
For example: After the user has installed a download software, the window with the advertisement content will always pop up, and the interference is normal. There are also some software installations, which will add an advertisement icon that is not coherent from the IE toolbar position, and ordinary users are difficult to clean.
definition: Spyware is a software capable of installing the back door on its computer if the user is unknown, collecting user information.
Hazard: User's privacy data and important information will be captured by "latte programs" and is sent to hackers, commercial companies, etc. These "latte programs" can even make the user's computer from remote manipulation, forming a huge "zombie network", which is one of the important hidden dangers of network security.
For example: Some software will acquire the user's hardwareware configuration and send out for commercial purposes.
3. Browser hijaches
: browser hijacking is a malicious program, tampered with the user's browser by browser plug-in, BHO (browser assist object), Winsock LSP, etc. The configuration is not normal, and is forcibly guided to the business website.
Hazard: When the user is browsing the website, it will be forced to install such plug-ins. The ordinary users cannot uninstall it. After being hijacked, the user will be forcibly booted to its designated website as long as the Internet will be forcibly guided to its designated website, seriously Normal Internet browsing.
For example: Some bad sites will pop up the installation window, force the user to install a browser plugin, even simply do not seek user comments, using system vulnerabilities to mandate in the user computer in the background. This plug-in also uses irregular software preparation techniques (this technology is usually used by viral) to escape user uninstall, often cause browser errors, system abnormal restart, etc.
4. Behavioral Record Software
Definition: Behavioral Record Software refers to software that does not have to be licensed, stealing and analyzing user privacy data, record user computer usage habits, and network browsing habits.
Hazard: Hard critical users, may be used by hackers to use online fraud.
For example: Some software will record users accessed in the background and analyze, and some will even send to specialized commercial companies or institutions, and such agencies will find out the hobbies of users and carry out Corresponding advertising or business activities.
5. Malicious Shareware
definition: Malicious Sharing Software refers to some shared software to force users to register in order to obtain benefits, using a deception, trial trap, etc., or bundle all kinds of malicious plugins in software It is not allowed to be installed in the user machine.
Hazard: Use the "trial trap" to force the user to register, otherwise personal information can be lost. Software integrated plugins may cause user browsers to be hijacked, privacy is stealing.
After the user installs a media playing software, it will be forced to install software (search plug-in, download software) without having to install, without given a clear prompt; and user uninstall player software Do not automatically uninstall these additional installed software.
, such as a encryption software, all encrypted data will be lost after the trial period, and only payment is purchased to retrieve the lost data.
With the development of the network, the classification of "rogue software" is getting worse, and some new types of rogue software are constantly appearing, and the classification standard will inevitably adjust.
Computer virus difference
Computer virus is: itself has a class of programs that have other programs that have destroy system functions, endanger user data or other malicious behaviors. Such programs often affect computer use and can copy themselves. The formal software refers to: For the convenience of users to work, entertainment, the software is developed, and the software is publicly released.
"Rogue Software" is between the two, and there is also normal function (download, media play, etc.) and malicious behavior (play advertisements, opening the door), bringing the user to the user. These software may also be called malicious advertising software (spyware), malicious sharing software (Malicious Shareware). Unlike viruses or worms, many software is not a small group or individual secretly prepared and spread, but there are many well-known companies and groups suspected of such software. The software uses a variety of technical means forced installation and confrontation. Many user complaints are installed in uninformed, and their various anti-unloading and automatic recovery technologies have made many software professionals feel difficult to deal with, so that they uninstall the technology that is often discussed and consulting on the mainland website. problem.
New rogue software may not be bundled insert
new rogue behavior includes intentionally hindering other similar software
New rogue software enforces it to install it to the system disk, users have no choice of power
new rogue behavior includes itself to speak their rogue behavior into BUG, cover
The anti-rogue software alliance supports the lawyer Huang Chen deeply said that the rogue software has to form a crime, and it is not necessary to dispose of the relevant provisions of the criminal law. But in terms of their civil liability, my country is still blank in legislation. Huang Chen believes that rogue software takes up user computer memory, causing the CPU to run speed, occupying hard disk capacity, has violated the user's property rights. But how the loss caused by the property rights is a problem.
Article 7 of the People's Republic of China Consumers Rights and Interests Protection Law stipulates that consumer property is not damaged, Article 8 stipulates that consumers' right, and Article 9 stipulates consumers. The option, Article 10 stipulates that consumers' fair trading rights, and Article 11 sets the compensation rights. If the computer user suffers from property damage due to the use of rogue software, it is clear that seventh, 10th; if the rogue software is forcibly installed without knowing the computer users, or hijacking the browser, you can apply the eighth, Nine, tenth. Huang Jin is said that although the Consumer Rights Protection Law of the People's Republic of China provides a certain legal basis, the above legal provisions are not clear for rogue software. Therefore, society is looking forward to getting regulations as soon as possible, and it is still quiet in this huge market.
In June 2005, the Beijing Network Industry Association held a seminar for China's first control rogue software. Sina, Sohu, NetEase, Rising, Jiangmin, etc. have drafted the "Software Product Behavior Safety Self-discipline Convention".
In July 2018, the National Computer Virus Emergency Processing Center found that 10 illegal hazardous mobile applications exist in mobile applications, reminding mobile users to do not download these illegal hazardous mobile applications, avoid The mobile phone operating system is unnecessary security threat.