Why Microsoft announced China's top ten rogue software
Source: Internet
Author: User
KeywordsMicrosoft Rogue Software
Yesterday, at the International Anti-Virus Conference in New Zealand, the Microsoft Security Research Response Team released a report showing that China's rogue software number ranked eighth in the world, the United States ranked first. The report also announced China's top ten Rogue Software: CNSMIN (3721), CNNIC Chinese keywords (CNNIC keyword search), Baidu.sobar (Baidu search PA), Sogou (Sogou), Baigoo (hundred dogs), Duduaccelerator (Dudu Accelerator), caishow (color show), dmcast (Desktop media), Hdtbar (a Web page toolbar) and real VNC (a remote control software). We analyze this year Microsoft announced China's top ten Rogue software list: Microsoft announced China's top ten rogue software list software and website name of the company's manufacturers Web site problems CNSMIN3721 Internet Assistant Beijing 3721 Technology Co., Ltd. WWW.3721.COM1, forced installation 2, browser hijacking 3 , interfering with other software running 4, unable to completely uninstall cnnic Chinese keywordscnnic keyword search China internet network Information Center WWW.CNNIC.NET.CN1, mandatory installation 2, Unable to completely uninstall Baidu.sobar Baidu search pa Baidu www.baidu.com forced installation Sogou (Sogou) Sohu www.sogou.com1, forced installation 2, induced user installation 3, Sogou Input method forcibly add Keyword link 4, Unable to completely uninstall Baigoo (hundred dogs) Wulin list company WWW.BAIGOO.COM1, browser hijacked 2, unable to completely uninstall Duduacceleratordudu accelerator thousand Oak Interactive ddd.dudu.com1, forced installation 2, induced user installation 3, Unable to completely uninstall caishow (color Show) Shenzhen Technology Co., Ltd. WWW.CAISHOW.COM1, mandatory installation 2, user behavior record dmcast Desktop media thousand Oak 1, forced installation 2, browser hijacking 3, pop-up ads 4, Unable to completely uninstall Hdtbar Web page toolbar real VNC remote control software Cambridge University at& T European Research Laboratory www.realvnc.com about Rogue software has never stopped, I think of a report last year, the time dated to July 11, 2005, when the Network industry association through netizens reported, published 10 of the most serious rogue software list, and called these rogue software companies in August 1 Rectification before 5th. The following is the Network industry association announced the top ten rogue software list: Top ten rogue software list ranking software and site name of the company's manufacturers web site problems top 3721 Internet Assistant Beijing 3721 Technology Co., Ltd. WWW.3721.COM1, compulsory AnnLoading 2, Browser hijacking 3, interfering with other software running 4, unable to completely uninstall runner-up Taobao Alibaba Www.taobao.com forcibly eject too many ads tan ebay ebay ebay inc.www.ebay.com.cn1, forced installation 2, browser hijacking 3, Unable to unload Jinshi Dudu Download accelerator thousand Oak company DDD.DUDU.COM1, mandatory installation 2, inducing user installation 3, unable to completely uninstall solution Yuan Chinese Internet Network Information Center WWW.CNNIC.NET.CN1, forced installation 2, Unable to completely uninstall Juren Green Entertainment chat software Green Entertainment Feng Science and technology www.qyule.com1, forced to install 2, eject too much advertising first-class scholar very good little secretary very good information Services Limited WWW.HENBANG.NET1, mandatory installation 2, Pop-up too much advertising second, such as scholar Baidu search pa Baidu www.baidu.com forced installation first Dongsheng a search tools Yahoo toolbar.yisou.com forced installation of the report said: August 15, 2005, become the Network industry association the most embarrassing day. Although the list was established on the basis of more than 2 million Internet users, and the information originated from IP addresses, the Network Industry association announced the withdrawal of the list. It goes without saying that, because the list of manufacturers, most of the Chinese Internet has a considerable power. After the list is published, most software vendors chose to remain silent when confronted with the media, while the Yahoo China spokeswoman, with 3721 Internet assistants and two software, said it was wrong for the Internet association to judge without technical treatment and even threatened to take legal action. What exactly is rogue software? The industry generally believes that rogue software is often between virus software and normal software, with normal functionality and malicious behavior. According to different characteristics and hazards, rogue software is mainly divided into advertising software (Adware), spyware (Spyware), browser hijacking, behavior recording software (Track Ware) , malicious sharing software (malicious shareware) and so on. In fact, as far as the rogue software itself, the author also extremely disgusted with the software of the evil, and all kinds of rankings is just according to the "Crime level" statistics, the purpose is "wanted" rogue software. Today, Microsoft out of a "rogue" ranking, it is another matter, a software company to select the "Software" ranking, the authority alone, certainly not as high as the authority of the Internet Association. So how do you rank rogue software in Microsoft? This makes one can't help thinking: ie can not withstand rogue harassment? What is the purpose of Microsoft? Do you really want to crack down on rogue software? Or is the policy to reduce the burden of IE? As we all know, anyone who is called "rogue" software, ie will not run, the first victim must be Windows users。 Microsoft, finally please do your own job, do not let us also disappointed with Vista! Related article connection: As for the official definition of rogue software, let's take a look at how the Chinese Internet Association defines rogue software this year (read the original text-the official definition of rogue software by the Chinese Internet Association), "official definition" malware definition: refers to without explicitly prompting the user or without user permission, The software which violates the legitimate rights and interests of users, but has been prescribed by our existing laws and regulations, except for computer viruses. -Mandatory installation: Refers to the behavior of installing software on a user's computer or other terminal without explicitly prompting the user or with permission from the user. -Difficult to uninstall: refers to the failure to provide a common uninstall method, or in the case of other software is not affected, the behavior of the program is still active after unloading. -Browser hijacking: means to modify a user's browser or other related settings without a user's permission, to force a user to visit a particular Web site or to cause users to be unable to access the Internet properly. Ad pop-up: Refers to the use of software installed on the user's computer or other terminals to eject the advertisement without explicitly prompting the user or the user's permission. -Malicious collection of user information: refers to the failure to explicitly prompt the user or without user permission, malicious collection of user information behavior. -Malicious uninstall: The act of not explicitly prompting the user, without permission from the user, or misleading or deceiving the user to uninstall the malware. -Malicious bundling: refers to the act of bundling in software that has been identified as malicious software. -other malicious acts that violate the user's right to know and choose. Related reading: 05 Network Association 10 big Rogue Software related reading: 360 security guards can killing 121 malicious software editor Zhao Zhaoyi#51cto.com TEL: (010) 68476636-8001 to force (0 votes) (0 votes) of the nonsense (0 Votes) Professional ( 0 Votes) The title of the party (0 Votes) passed (0 Votes) Original: Microsoft based on what announced China's top ten rogue software return to network security home
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.