THE WHATIS.COM WORD-OF-THE-DAY   
March 24, 2003

drive-by download 

______________
SPONSORED BY: Global Knowledge

BECOME THE EXPERT!

Global Knowledge is a worldwide leader in IT education and enterprise
training solutions, offering more than 700 courses. For a limited
time purchase any 3 courses at one time, and get $1,000 off the
total! Choices include Network Security, Microsoft Windows 2000
Server, and Linux Administration. 

Click here to review our entire course catalog
http://WhatIs.com/r/0,,11697,00.htm?globalknowledge 
________________   
TODAY'S WORD: drive-by download 

See our complete definition with hyperlinks at
http://whatis.techtarget.com/definition/0,,sid9_gci887624,00.html 

A drive-by download is a program that is automatically downloaded to
your computer, often without your consent or even your knowledge.
Unlike a pop-up download, which asks for assent (albeit in a
calculated manner likely to lead to a "yes"), a drive-by download is
carried out invisibly to the user: it can be initiated by simply
visiting a Web site or viewing an HTML e-mail message. 

Frequently, a drive-by download is installed along with another
application. For example, a file sharing program might include
downloads for a spyware program that tracks and reports user
information for targeted marketing purposes, and an adware program
that generates pop-up advertisements using that information. If your
computer's security settings are lax, it may be possible for drive-by
downloads to occur without any action on your part. 

Xupiter, an Internet Explorer toolbar program, is frequently
installed as a drive-by download. The program is said to replace the
user's home page, change browser settings, and use redirection to
take all searches to the Xupiter Web site. In some versions, the
program initiates drive-by downloads of other programs. Furthermore,
although it comes with an uninstall utility, Xupiter is said to be
next to impossible for the average computer user to remove. 

There are some arguments to be made in favor of drive-by downloads,
particularly for downloads of patches or service packs that address
security flaws. If these were automatically installed, instead of
depending on the diligence of server administrators, computers and
the Internet in general might be safer from malicious programming
such as viruses and worms. In January 2003, a worm called the SQL
Slammer exploited a known buffer overflow vulnerability in Microsoft
SQL 2000 server systems to cause widespread Internet outages. The
attack was launched precisely six months after Microsoft released a
patch for the flaw. If the patch had been installed to vulnerable
systems, the attack would have had little impact. 

However, although drive-by downloads for patches might address
specific security flaws, they might also conflict with existing
system configurations, and thus create more problems than they solve.

RELATED TERMS:

pop-up download 
http://whatis.techtarget.com/definition/0,,sid9_gci887635,00.html 

spyware 
http://searchcio.techtarget.com/sDefinition/0,,sid19_gci214518,00.html 

adware 
http://searchwebservices.techtarget.com/sDefinition/0,,sid26_gci521293,00.html 

redirection 
http://searchwebservices.techtarget.com/sDefinition/0,,sid26_gci214493,00.html 

patch
http://searchsystemsmanagement.techtarget.com/sDefinition/0,,sid20_gci212753,00.html 

service pack
http://searchwin2000.techtarget.com/sDefinition/0,,sid1_gci507067,00.html 

______________
SELECTED LINKS:

SearchSecurity offers a collection of Best Web Links about Malware
(Trojan horses, viruses & worms).  
http://searchsecurity.techtarget.com/bestWebLinks/0,289521,sid14_tax281940,00.html 

ZDNet's BizTech Library features an article called "Beware of
Drive-by Downloads."  
http://cma.zdnet.com/texis/techinfobase/techinfobase/++wq_qoK6968sW_/zdisplay.html 

The Counterexploitation Web site has advice about "Adware, Spyware
and other unwanted "malware" - and how to remove them."  
http://www.cexx.org/adware.htm 

______________
TODAY'S TECH NEWS:

INTERSAN EXTENDS PATHLINE AUTOMATION FEATURES
InterSAN is prepping for an upgrade of its Pathline management and
automation product. 
http://searchstorage.techtarget.com/originalContent/0,289142,sid5_gci887497,00.html 

CIO, CPO RELATIONSHIP BECOMING KEY IN IT SHOPS
With government initiatives such as HIPAA (the Health Insurance
Portability and Accountability Act) turning up the pressure to
protect customer data, organizations have recognized the need to rank
privacy ahead of almost all other issues. 
http://searchcio.techtarget.com/originalContent/0,289142,sid19_gci887780,00.html 

FREIGHT COMPANY HAULS IN 37,000 WINDOWS PATCHES
Administrators at freight giant CNF have installed an eye-popping
37,000 Windows desktop patches since August. An IT manager with CNF
explained why they needed so many, and he offered some patch
management advice for those who need to patch things up in their own
organizations. 
http://searchwindowsmanageability.techtarget.com/originalContent/0,289142,sid33_gci887247,00.html
 

>> Catch up on all the latest IT news at  
http://searchtechtarget.techtarget.com/ 

______________________
KNOW-IT-ALL QUESTION | Do you speak geek?

This operating system originated at Bell Labs in 1969 as an
interactive time-sharing system. 

  a. BASIC
  b. DOS
  c. Linux 
  d. Unix

>> See correct answer
http://searchsolaris.techtarget.com/sDefinition/0,,sid12_gci213253,00.html 

______________________
QUIZ #36 | Linux Basics

Take our latest quiz and see how much you know about Linux. Make
Linus Torvalds proud! 

>> Click to take the quiz
http://searchenterpriselinux.techtarget.com/sDefinition/0,,sid39_gci882525,00.html

______________________________ 
RECENT ADDITIONS AND UPDATES 

[1] non-geographic number 
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci885964,00.html 

[2] Internet Key Exchange 
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci884946,00.html 

[3] Wi-Fi Protected Access 
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci887323,00.html 

[4] Learning Guide: Introduction to XML
http://whatis.techtarget.com/definition/0,,sid9_gci887243,00.html 

[5] Learning Guide: Security Policy Primer
http://whatis.techtarget.com/definition/0,,sid9_gci887248,00.html 

____________________________________________________________________
:::::::::::::::::::  WHATIS.COM CONTACTS   :::::::::::::::::::

LOWELL THING, Site Editor ([EMAIL PROTECTED])
____________________________________________________________________

MARGARET ROUSE, Associate Editor ([EMAIL PROTECTED])

___________________________________________________________________
::::::::::::::::::::  ABOUT THIS NEWSLETTER   :::::::::::::::::::::

Published by TechTarget (http://www.techtarget.com)
 TechTarget - The Most Targeted IT Media
 Copyright 2003, All Rights Reserved.

Unsubscribe from 'Word of the Day'
 - Simply Reply to this Email with REMOVE within the Body or Subject
>  or
 - Go to: http://WhatIs.techtarget.com/register
 - Log in to edit your profile.
 - Click on the link to Edit email subscriptions.
 - Uncheck the box next to the newsletter you wish 
   to unsubscribe from.
 - When finished, click "Save Changes to My Profile."


Reply via email to