{"id":77,"date":"2005-03-23T12:34:00","date_gmt":"2005-03-23T12:34:00","guid":{"rendered":"http:\/\/markwilson.me.uk\/blog\/2005\/03\/looking-at-where-spyware-hides-and-why.htm"},"modified":"2007-07-24T18:06:19","modified_gmt":"2007-07-24T17:06:19","slug":"looking-at-where-spyware-hides-and-why","status":"publish","type":"post","link":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/looking-at-where-spyware-hides-and-why.htm","title":{"rendered":"Looking at where spyware hides and why we should be bothered about it"},"content":{"rendered":"<p><!--111158133314138707-->I just came across a useful page on the <a href=\"http:\/\/www.hp.com\/\">HP<\/a> website providing details of some of the locations <a href=\"http:\/\/h71028.www7.hp.com\/eNewsletter\/cache\/110978-0-0-224-121.aspx\">where spyware hides<\/a> and the different forms it takes.<\/p>\n<p>Another page looks at the <a href=\"http:\/\/h71028.www7.hp.com\/eNewsletter\/cache\/110968-0-0-224-121.aspx\">business cost of spyware<\/a>.<\/p>\n<p>Interesting reading.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I just came across a useful page on the HP website providing details of some of the locations where spyware hides and the different forms it takes. Another page looks at the business cost of spyware. Interesting reading.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[],"tags":[62],"class_list":["post-77","post","type-post","status-publish","format-standard","hentry","tag-malware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Looking at where spyware hides and why we should be bothered about it - markwilson.it<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/looking-at-where-spyware-hides-and-why.htm\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Looking at where spyware hides and why we should be bothered about it - markwilson.it\" \/>\n<meta property=\"og:description\" content=\"I just came across a useful page on the HP website providing details of some of the locations where spyware hides and the different forms it takes. Another page looks at the business cost of spyware. Interesting reading.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/looking-at-where-spyware-hides-and-why.htm\" \/>\n<meta property=\"og:site_name\" content=\"markwilson.it\" \/>\n<meta property=\"article:published_time\" content=\"2005-03-23T12:34:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2007-07-24T17:06:19+00:00\" \/>\n<meta name=\"author\" content=\"Mark Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:site\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Wilson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/looking-at-where-spyware-hides-and-why.htm#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/looking-at-where-spyware-hides-and-why.htm\"},\"author\":{\"name\":\"Mark Wilson\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"headline\":\"Looking at where spyware hides and why we should be bothered about it\",\"datePublished\":\"2005-03-23T12:34:00+00:00\",\"dateModified\":\"2007-07-24T17:06:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/looking-at-where-spyware-hides-and-why.htm\"},\"wordCount\":51,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"keywords\":[\"Malware\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/looking-at-where-spyware-hides-and-why.htm#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/looking-at-where-spyware-hides-and-why.htm\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/looking-at-where-spyware-hides-and-why.htm\",\"name\":\"Looking at where spyware hides and why we should be bothered about it - markwilson.it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\"},\"datePublished\":\"2005-03-23T12:34:00+00:00\",\"dateModified\":\"2007-07-24T17:06:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/looking-at-where-spyware-hides-and-why.htm#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/looking-at-where-spyware-hides-and-why.htm\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/03\\\/looking-at-where-spyware-hides-and-why.htm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Looking at where spyware hides and why we should be bothered about it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/\",\"name\":\"markwilson.it\",\"description\":\"get-info -class technology | write-output &gt; \\\/dev\\\/web\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\",\"name\":\"Mark Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"width\":800,\"height\":800,\"caption\":\"Mark Wilson\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\"},\"description\":\"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.\",\"sameAs\":[\"http:\\\/\\\/www.markwilson.co.uk\\\/\",\"https:\\\/\\\/www.instagram.com\\\/markwilsonuk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/markawilson\\\/\",\"https:\\\/\\\/x.com\\\/markwilsonit\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCWHlZCoHRTocdvtrOJ2IL4A\"],\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/author\\\/mark-wilson\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Looking at where spyware hides and why we should be bothered about it - markwilson.it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/looking-at-where-spyware-hides-and-why.htm","og_locale":"en_GB","og_type":"article","og_title":"Looking at where spyware hides and why we should be bothered about it - markwilson.it","og_description":"I just came across a useful page on the HP website providing details of some of the locations where spyware hides and the different forms it takes. Another page looks at the business cost of spyware. Interesting reading.","og_url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/looking-at-where-spyware-hides-and-why.htm","og_site_name":"markwilson.it","article_published_time":"2005-03-23T12:34:00+00:00","article_modified_time":"2007-07-24T17:06:19+00:00","author":"Mark Wilson","twitter_card":"summary_large_image","twitter_creator":"@markwilsonit","twitter_site":"@markwilsonit","twitter_misc":{"Written by":"Mark Wilson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/looking-at-where-spyware-hides-and-why.htm#article","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/looking-at-where-spyware-hides-and-why.htm"},"author":{"name":"Mark Wilson","@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"headline":"Looking at where spyware hides and why we should be bothered about it","datePublished":"2005-03-23T12:34:00+00:00","dateModified":"2007-07-24T17:06:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/looking-at-where-spyware-hides-and-why.htm"},"wordCount":51,"commentCount":0,"publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"keywords":["Malware"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/looking-at-where-spyware-hides-and-why.htm#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/looking-at-where-spyware-hides-and-why.htm","url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/looking-at-where-spyware-hides-and-why.htm","name":"Looking at where spyware hides and why we should be bothered about it - markwilson.it","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#website"},"datePublished":"2005-03-23T12:34:00+00:00","dateModified":"2007-07-24T17:06:19+00:00","breadcrumb":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/looking-at-where-spyware-hides-and-why.htm#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/looking-at-where-spyware-hides-and-why.htm"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/looking-at-where-spyware-hides-and-why.htm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.markwilson.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Looking at where spyware hides and why we should be bothered about it"}]},{"@type":"WebSite","@id":"https:\/\/www.markwilson.co.uk\/blog\/#website","url":"https:\/\/www.markwilson.co.uk\/blog\/","name":"markwilson.it","description":"get-info -class technology | write-output &gt; \/dev\/web","publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.markwilson.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468","name":"Mark Wilson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","url":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","width":800,"height":800,"caption":"Mark Wilson"},"logo":{"@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1"},"description":"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.","sameAs":["http:\/\/www.markwilson.co.uk\/","https:\/\/www.instagram.com\/markwilsonuk\/","https:\/\/www.linkedin.com\/in\/markawilson\/","https:\/\/x.com\/markwilsonit","https:\/\/www.youtube.com\/channel\/UCWHlZCoHRTocdvtrOJ2IL4A"],"url":"https:\/\/www.markwilson.co.uk\/blog\/author\/mark-wilson"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":81,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/spyware-re-enforces-need-for-network.htm","url_meta":{"origin":77,"position":0},"title":"Spyware re-enforces the need for network segmentation and remediation","author":"Mark Wilson","date":"Thursday 31 March 2005","format":false,"excerpt":"There is no doubt that malicious software (malware) is on the increase. We have learnt how to deal with the ever increasing number of viruses, worms and Trojan horses, but spyware is now a major problem too. Earlier this month, it was widely reported how a joint investigation by law\u2026","rel":"","context":"In \"Malware\"","block_context":{"text":"Malware","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/malware"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":46,"url":"https:\/\/www.markwilson.co.uk\/blog\/2004\/12\/microsoft-buys-giant-company.htm","url_meta":{"origin":77,"position":1},"title":"Microsoft buys Giant Company","author":"Mark Wilson","date":"Tuesday 21 December 2004","format":false,"excerpt":"Back in August I posted a blog entry about the what you should know about spyware article on the Microsoft website. The article has since been replaced but I was interested to read about Microsoft's purchase of Giant Company - a leading provider of anti-spyware and anti-spam software. Paul Thurrott's\u2026","rel":"","context":"In \"Microsoft\"","block_context":{"text":"Microsoft","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/microsoft"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":550,"url":"https:\/\/www.markwilson.co.uk\/blog\/2004\/08\/what-you-should-know-about-spyware.htm","url_meta":{"origin":77,"position":2},"title":"What you should know about spyware","author":"Mark Wilson","date":"Monday 2 August 2004","format":false,"excerpt":"Microsoft have published an interesting article to give a heads up on spyware. Simple it may be, but practical advice nonetheless. Even experienced administrators need to beware - whilst researching some security issues this week, out of necessity I hit on some of the more unsavoury sites on the 'net\u2026","rel":"","context":"In \"Malware\"","block_context":{"text":"Malware","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/malware"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":49,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/01\/microsofts-new-malware-removal-and.htm","url_meta":{"origin":77,"position":3},"title":"Microsoft&#8217;s new malware removal and anti-spyware products","author":"Mark Wilson","date":"Friday 14 January 2005","format":false,"excerpt":"This week, alongside the January security updates, Microsoft released the first version of its malware removal tool, called the Microsoft Windows Malicious Software Removal Tool (MSRT). New versions will be released on the second Tuesday of each month (with the monthly security updates) and each version will be cumulative. Note\u2026","rel":"","context":"In \"Malware\"","block_context":{"text":"Malware","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/malware"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":122,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/06\/watch-out-for-cookies-when-using.htm","url_meta":{"origin":77,"position":4},"title":"Watch out for cookies when using the Microsoft AntiSpyware beta","author":"Mark Wilson","date":"Wednesday 29 June 2005","format":false,"excerpt":"Last year I blogged about Microsoft's acquisition of Giant Software and I've been using their AntiSpyware Beta since it was made available in January; but last week I was looking at the inordinate amount of spam my Dad receives and that got me thinking about the overall security on his\u2026","rel":"","context":"In \"Malware\"","block_context":{"text":"Malware","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/malware"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":47,"url":"https:\/\/www.markwilson.co.uk\/blog\/2004\/12\/symantec-and-veritas-to-merge.htm","url_meta":{"origin":77,"position":5},"title":"Symantec and Veritas to merge","author":"Mark Wilson","date":"Tuesday 21 December 2004","format":false,"excerpt":"December seems to be the month for high-profile corporate takeovers in the IT world! A couple of weeks back IBM sold its PC business. Then last week Microsoft bought an anti-spyware company. Now I've read that Symantec and Veritas are to merge in a $13.5bn deal. I regularly recommend Veritas'\u2026","rel":"","context":"In \"Symantec\"","block_context":{"text":"Symantec","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/symantec"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/77","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=77"}],"version-history":[{"count":0,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/77\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=77"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=77"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=77"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}