answersLogoWhite

0


Best Answer

any annoying and unwanted program that might or might not mean you harm.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is grayware?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science
Related questions

What is ment by grayware?

Grayware is a general term sometimes used as a classification for applications that behave in a manner that is annoying or undesirable, and yet less serious or troublesome than Malware. Grayware encompasses spyware, adware, dialers, joke programs, remote access tools, and any other unwelcome files and programs apart from viruses that are designed to harm the performance of computers on your network.


Which type of security threat can be transferred through email an is used to gain sensitive information by recording the keystrokes of the email recipient?

grayware


How do you download avg7?

Go to download.com. And search for AVG 7. This website is a great one because know a days you have to be very careful what you download. download.com is a trusted site that does not contain tainted software with adware, spyware, grayware, viruses, trojans and worms. However AVG 8 which is free is also available so I would search it instead.


What is greyware?

Grayware refers to applications or files that are not classified as viruses or Trojan horse programs, but can still negatively affect the performance of the computers on your network and introduce significant security risks to your organization. The best example are the annoying pop-ups that come up when you open your browser. In addition they also computers vulnerable to attacks. Other examples are spyware, adware, dialers, joke programs, remote access tools, and any other unwelcome files and programs apart from viruses that can harm the performance of computers on your network.


Why is it important to install antivirus?

Anti virus software is important because it specializes in the quarantining and removal of viruses. A virus is malicious code that has the ability to duplicate and they send copies of itself to other computers. Why are viruses bad. They can delete or alter files, send themselves to recipents on your contact list, freeze your computer and more. Anti virus software helps home users and business stay protected. However, there are plenty of more threats out there. So recommend Windows Live Onecare. It will protect you from all known threats. That includes worms, trojans, spyware, adware, phishing, pharming, and grayware


What might cause a mysterious networking problem?

Well if it is a wireless network interference or a weak signal might cause a network problem. Malware infections will also cause problems. Which are an infection of trojans, virus, worms, spyware, adware, freeware and grayware. Also if your router isn't working properly that would not allow the data to be transfered.Another thing is cables can be jerked around and cause influence on the network. A firewall placed near the outside line of your network should be a good practice on your network.I would rather have this "mysterious networking problem" better described, but I will share what crossed my mind. Because the word "mysterious" is used I assume everything seems to be in good working order and that no malware has been detected.You want to make sure your power is "clean". Make sure that all your computers and peripherals are on circuits shared by no other equipment. Fluorescent lighting, complex sound systems, even radios, can cause signal problems within a circuit. Look for anything with a magnet, like speakers, because magnets can interfere with signals even if powered by a different circuit. This includes phones because of the speaker and microphone; both have magnets. Make sure that any such component is at least 6 inches from any network conductor. Look for that refrigerator magnet stuck to the side of a computer tower. (Stickers don't matter.)Power conductors, such as those feeding your receptacles (outlets), should not run closer than 6 inches to signal conductors unless they are crossing at 90 degree angles. That means that if your network jacks and your receptacle jacks occupy the same wall cavity (that is the space between studs) this may be the source of your problem unless the conductors were run on opposite sides of the cavity. Opposite sides of the same stud is not sufficient distance.Make sure all your computers and peripherals are on surge protectors.Make sure all circuits are properly grounded. Just because you have a 3 prong receptacle doesn't mean it was wired correctly. And if you have any 3 prong cord ends with missing ground prongs, get them fixed. Proper grounding can fix a lot of signal problems.As always, if you are in doubt about what to do, the best advice anyone should give you is to call a licensed electrician to advise what work is needed.Before you do any work yourself,on electrical circuits, equipment or appliances,always use a test meter to ensure the circuit is, in fact, de-energized.IF YOU ARE NOT ALREADY SURE YOU CAN DO THIS JOBSAFELY AND COMPETENTLYREFER THIS WORK TO QUALIFIED PROFESSIONALS.


What are the risks of opening up an email attachments?

The risk is the spread of malware. Malware is anything that affects the functionability of your system or executes commands that are not wanted by the user. You can get anything from viruses to trojans to worms, spyware, adware, grayware. The best way to help avoid these dangerous attachments is to really chose your email account wisely. Yahoo is the best free email because it scans all of the files you want to send as attachments and before you open them it scans them again. This helps to stop the spread of email. The next is to use common sense. As your self am I suppose to get this email. also ask your self these questions. was I expecting it, do I know the sender, does me getting it help me in any way and why would I need the email and the attachmentEmail viruses and worms are common. If you've not received one, chances are you will. Here are steps you can use to help you decide what to do with every email message with an attachment that you receive. You should only read a message that passes all of these tests.The Know test: Is the email from someone that you know?The Received test: Have you received email from this sender before?The Expect test: Were you expecting email with an attachment from this sender?The Sense test: Does email from the sender with the contents as described in the Subject line and the name of the attachment(s) make sense? For example, would you expect the sender - let's say your Mother - to send you an email message with the Subject line "Here you have, ;o)" that contains a message with attachment - let's say AnnaKournikova.jpg.vbs? A message like that probably doesn't make sense. In fact, it happens to be an instance of the Anna Kournikova worm, and reading it can damage your system.The Virus test: Does this email contain a virus? To determine this, you need to install and use an anti-virus program. That task is described in Task 1 - Install and Use Anti-Virus Programs of "Home Computer Security."You should apply these tests - KRESV - to every piece of email with an attachment that you receive. If any test fails, toss that email. If they all pass, then you still need to exercise care and watch for unexpected results as you read it.