- ... usage.1
- Deciding whether a
particular program should be called spyware or not can be both
difficult and delicate. In practice, there is a continuous spectrum
of program behavior that spans from malicious and invasive to fully
legitimate. In this paper, we use the term spyware very broadly,
and in general apply the term as might be commensurate with the
experience of an unsophisticated user. However, we are careful to
describe the precise behavior of individual programs discussed in
this paper.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...
spyware.2
- Kazaa is now distributed in two versions: a free
version that contains spyware, and a paid version without spyware.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ... programs.3
- Note that we
could not measure spyware installations on computers that were
inactive during our tracing period, so this number is conservative.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.