Which software gathers information about a computer without the users knowledge or consent?

Macro Virus: These type of virus infects word, excel, PowerPoint, access and other data files. Once infected repairing of these files is very much difficult.

Master boot record files: MBR viruses are memory-resident viruses and copy itself to the first sector of a storage device which is used for partition tables or OS loading programs .A MBR virus will infect this particular area of Storage device instead of normal files. The easiest way to remove a MBR virus is to clean the MBR area,

Boot sector virus: Boot sector virus infects the boot sector of a HDD or FDD. These are also memory resident in nature. As soon as the computer starts it gets infected from the boot sector.  Cleaning this type of virus is very difficult.

Multipartite virus: A hybrid of Boot and Program/file viruses. They infect program files and when the infected program is executed, these viruses infect the boot record. When you boot the computer next time the virus from the boot record loads in memory and then start infecting other program files on disk

Polymorphic viruses: A virus that can encrypt its code in different ways so that it appears differently in each infection. These viruses are more difficult to detect.

Stealth viruses: These types of viruses use different kind of techniques to avoid detection. They either redirect the disk head to read another sector instead of the one in which they reside or they may alter the reading of the infected file’s size shown in the directory listing. For example, the Whale virus adds 9216 bytes to an infected file; then the virus subtracts the same number of bytes (9216) from the size given in the directory.

Spyware Coalition which coordinates fight against spyware."],"id":"spyware","title":"Spyware"},"groups":[{"snippet":"means a type of malware which collects information about users without their knowledge;","snippetLinks":[{"key":"type-of","type":"definition","offset":[8,15]},{"key":"malware","type":"clause","offset":[16,23]},{"key":"information","type":"clause","offset":[39,50]},{"key":"users","type":"clause","offset":[57,62]},{"key":"knowledge","type":"clause","offset":[77,86]}],"size":7,"samples":[{"uri":"https://www.etxcapital.com/docs/default-source/affiliates/etx-affiliates-terms-and-conditions-en_dec18.pdf?sfvrsn=2","label":"www.etxcapital.com","score":16},{"uri":"https://cdn.monecor.com/sitefinity/docs/default-source/Landing_Pages/ETX_Affiliates_Terms_and_Conditions_EN.pdf","label":"cdn.monecor.com","score":16},{"uri":"https://www.etxcapital.com/docs/default-source/affiliates/cy-etx-affiliate-terms-and-conditions-october-2021.pdf","label":"www.etxcapital.com","score":8}],"hash":"128ebf78a8f3aa6ba3b5691e5450aef1","id":1},{"snippet":"means programming that gathers information about a computer user without permission.","snippetLinks":[{"key":"programming","type":"clause","offset":[6,17]},{"key":"information","type":"clause","offset":[31,42]},{"key":"computer","type":"clause","offset":[51,59]},{"key":"user","type":"clause","offset":[60,64]},{"key":"without-permission","type":"definition","offset":[65,83]}],"size":6,"samples":[{"uri":"/contracts/cKyzle7sGk7#spyware","label":"Share Purchase Agreement (Marchex Inc)","score":21},{"uri":"/contracts/iWd56AhtAWd#spyware","label":"Equity Purchase Agreement (Marchex Inc)","score":21},{"uri":"/contracts/777htXpKf8u#spyware","label":"Agreement and Plan of Merger (Marchex Inc)","score":21}],"hash":"ce6626763718b740980b876ea075a298","id":2},{"snippet":"means any software that covertly gathers information regarding user online activity through the user’s Internet connection (i.e., without notice that such information may be gathered), whether or not such software is bundled as a hidden component of a toolbar or like application, other than information: (i) reasonably gathered in connection with services or information provided by the Company or its Subsidiary to such users, or (ii) that is not associated with Personally Identifiable Information. “Personally Identifiable Information” means data that identifies or locates a particular person, including but not limited to name, address, telephone number, electronic mail address, social security number, bank account number or credit card number; provided, however that data shall not be Personally Identifiable Information for purposes of this Agreement if the Company and its Subsidiary (x) do not intentionally collect or intentionally receive any such data and (y) do not become aware of the identity or location of, or identify or locate, a particular person as a result of any receipt of such data. “Adware” means any software that causes advertising to pop-up as a new window (over or under) on the user’s computer based on the user’s online activity (other than advertisements that the Company or its Subsidiary serves to visitors to their respective Websites while those visitors are visiting or exiting such Websites) or which is used to distribute Spyware.","snippetLinks":[{"key":"software","type":"clause","offset":[10,18]},{"key":"covertly","type":"definition","offset":[24,32]},{"key":"information-regarding","type":"clause","offset":[41,62]},{"key":"online-activity","type":"definition","offset":[68,83]},{"key":"the-user","type":"clause","offset":[92,100]},{"key":"internet-connection","type":"clause","offset":[103,122]},{"key":"without-notice","type":"clause","offset":[130,144]},{"key":"such-information","type":"definition","offset":[150,166]},{"key":"gathered","type":"definition","offset":[174,182]},{"key":"bundled","type":"clause","offset":[217,224]},{"key":"hidden","type":"definition","offset":[230,236]},{"key":"component","type":"clause","offset":[237,246]},{"key":"toolbar","type":"clause","offset":[252,259]},{"key":"application","type":"clause","offset":[268,279]},{"key":"in-connection-with","type":"clause","offset":[329,347]},{"key":"services","type":"clause","offset":[348,356]},{"key":"information-provided-by-the-company","type":"clause","offset":[360,395]},{"key":"subsidiary","type":"clause","offset":[403,413]},{"key":"users","type":"clause","offset":[422,427]},{"key":"associated-with","type":"definition","offset":[449,464]},{"key":"personally-identifiable-information","type":"clause","offset":[465,500]},{"key":"data","type":"clause","offset":[546,550]},{"key":"identifies","type":"clause","offset":[556,566]},{"key":"locates","type":"clause","offset":[570,577]},{"key":"particular","type":"clause","offset":[580,590]},{"key":"including","type":"clause","offset":[599,608]},{"key":"not-limited","type":"clause","offset":[613,624]},{"key":"telephone-number","type":"clause","offset":[643,659]},{"key":"electronic-mail-address","type":"clause","offset":[661,684]},{"key":"social-security-number","type":"clause","offset":[686,708]},{"key":"bank-account-number","type":"clause","offset":[710,729]},{"key":"credit-card-number","type":"clause","offset":[733,751]},{"key":"for-purposes-of-this-agreement","type":"clause","offset":[830,860]},{"key":"the-company-and","type":"clause","offset":[864,879]},{"key":"intentionally","type":"clause","offset":[906,919]},{"key":"collect","type":"clause","offset":[920,927]},{"key":"receive","type":"clause","offset":[945,952]},{"key":"identity","type":"clause","offset":[1002,1010]},{"key":"location-of","type":"clause","offset":[1014,1025]},{"key":"identify","type":"clause","offset":[1030,1038]},{"key":"as-a-result-of","type":"definition","offset":[1070,1084]},{"key":"receipt-of","type":"clause","offset":[1089,1099]},{"key":"adware","type":"definition","offset":[1112,1118]},{"key":"causes","type":"clause","offset":[1144,1150]},{"key":"advertising","type":"clause","offset":[1151,1162]},{"key":"pop","type":"definition","offset":[1166,1169]},{"key":"window","type":"clause","offset":[1182,1188]},{"key":"computer","type":"clause","offset":[1219,1227]},{"key":"based-on-the","type":"clause","offset":[1228,1240]},{"key":"advertisements","type":"clause","offset":[1276,1290]},{"key":"serves","type":"definition","offset":[1326,1332]},{"key":"visitors","type":"clause","offset":[1336,1344]},{"key":"respective","type":"definition","offset":[1354,1364]},{"key":"websites","type":"clause","offset":[1365,1373]},{"key":"visiting","type":"clause","offset":[1399,1407]},{"key":"to-distribute","type":"definition","offset":[1451,1464]}],"size":6,"samples":[{"uri":"/contracts/5gR1Ovql4oH#spyware","label":"Agreement and Plan of Merger and Reorganization (Scripps E W Co /De)","score":21}],"hash":"95a51876845ddf17c935f977bf060029","id":3},{"snippet":"means any software that covertly gathers information regarding user online activity through the user’s Internet connection (i.e., without notice that such information may be gathered), whether or not such software is bundled as a hidden component of the Sellers’ toolbar or like applications, other than information (i) reasonably gathered in connection with services or information provided by the Sellers to such users, or (ii) that is not associated with personally identifiable information.","snippetLinks":[{"key":"software","type":"clause","offset":[10,18]},{"key":"covertly","type":"definition","offset":[24,32]},{"key":"information-regarding","type":"clause","offset":[41,62]},{"key":"online-activity","type":"definition","offset":[68,83]},{"key":"the-user","type":"clause","offset":[92,100]},{"key":"internet-connection","type":"clause","offset":[103,122]},{"key":"without-notice","type":"clause","offset":[130,144]},{"key":"such-information","type":"definition","offset":[150,166]},{"key":"gathered","type":"definition","offset":[174,182]},{"key":"bundled","type":"clause","offset":[217,224]},{"key":"hidden","type":"definition","offset":[230,236]},{"key":"component","type":"clause","offset":[237,246]},{"key":"of-the-sellers","type":"clause","offset":[247,261]},{"key":"toolbar","type":"clause","offset":[263,270]},{"key":"applications","type":"clause","offset":[279,291]},{"key":"in-connection-with","type":"clause","offset":[340,358]},{"key":"services","type":"clause","offset":[359,367]},{"key":"information-provided","type":"clause","offset":[371,391]},{"key":"by-the-sellers","type":"clause","offset":[392,406]},{"key":"users","type":"clause","offset":[415,420]},{"key":"associated-with","type":"definition","offset":[442,457]},{"key":"personally-identifiable-information","type":"clause","offset":[458,493]}],"size":4,"samples":[{"uri":"/contracts/8LwGguVL22k#spyware","label":"Noncompetition Agreement (Ezcorp Inc)","score":21},{"uri":"/contracts/dHcmSwm2TqH#spyware","label":"Asset Purchase Agreement (Cash America International Inc)","score":21}],"hash":"6e907fc6683a5a6f6a6047350a9cf97b","id":4},{"snippet":"means a type of malware that can be installed on computers and collects small pieces of information about users without their knowledge; the presence of spyware is typically hidden from the user and can be difficult to detect; spyware is typically secretly installed on the user's personal computer;","snippetLinks":[{"key":"type-of","type":"definition","offset":[8,15]},{"key":"malware","type":"clause","offset":[16,23]},{"key":"installed","type":"clause","offset":[36,45]},{"key":"computers","type":"clause","offset":[49,58]},{"key":"small","type":"definition","offset":[72,77]},{"key":"pieces","type":"definition","offset":[78,84]},{"key":"of-information","type":"definition","offset":[85,99]},{"key":"users","type":"clause","offset":[106,111]},{"key":"knowledge","type":"clause","offset":[126,135]},{"key":"presence","type":"clause","offset":[141,149]},{"key":"typically","type":"definition","offset":[164,173]},{"key":"hidden","type":"definition","offset":[174,180]},{"key":"the-user","type":"clause","offset":[186,194]},{"key":"detect","type":"definition","offset":[219,225]},{"key":"personal-computer","type":"clause","offset":[281,298]}],"size":3,"samples":[{"uri":"https://client.quinnixtrade.com/QuinnixClientAgreementq.pdf","label":"S Agreement","score":21},{"uri":"https://client.quinnixtrade.com/QuinnixAgreementlatest.pdf","label":"S Agreement","score":21},{"uri":"https://client.quinnixtrade.com/QuinnixClientAgreement.pdf","label":"Client Agreement","score":12}],"hash":"273e9efd3da56aa9ef129a23bc7621bf","id":5},{"snippet":"when used in the Agreement and/or any agreements by and between us, including, without limitation, these Terms and Conditions, unless the context otherwise requires, shall mean a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge; the presence of spyware is typically hidden from the user, and can be difficult to detect; typically, spyware is secretly installed on the user's personal computer;","snippetLinks":[{"key":"the-agreement","type":"clause","offset":[13,26]},{"key":"and-or","type":"clause","offset":[27,33]},{"key":"agreements","type":"clause","offset":[38,48]},{"key":"including","type":"clause","offset":[68,77]},{"key":"without-limitation","type":"clause","offset":[79,97]},{"key":"these-terms-and-conditions","type":"clause","offset":[99,125]},{"key":"the-context","type":"clause","offset":[134,145]},{"key":"requires","type":"definition","offset":[156,164]},{"key":"type-of","type":"definition","offset":[179,186]},{"key":"malware","type":"clause","offset":[187,194]},{"key":"installed","type":"clause","offset":[207,216]},{"key":"computers","type":"clause","offset":[220,229]},{"key":"small","type":"definition","offset":[250,255]},{"key":"pieces","type":"definition","offset":[256,262]},{"key":"of-information","type":"definition","offset":[263,277]},{"key":"users","type":"clause","offset":[284,289]},{"key":"knowledge","type":"clause","offset":[304,313]},{"key":"presence","type":"clause","offset":[319,327]},{"key":"typically","type":"definition","offset":[342,351]},{"key":"hidden","type":"definition","offset":[352,358]},{"key":"the-user","type":"clause","offset":[364,372]},{"key":"detect","type":"definition","offset":[398,404]},{"key":"personal-computer","type":"clause","offset":[461,478]}],"size":3,"samples":[{"uri":"https://traders-trust.com/wp-content/uploads/2019/10/TTCM-Client-Agreement-Terms-Conditions-of-Business_14102019.pdf","label":"Client Agreement","score":21},{"uri":"https://traders-trust.com/documents/TTCM-Client-Agreement-Terms-Conditions-of-Business-EN.pdf","label":"Client Agreement Terms","score":21}],"hash":"ded73c6da8fc0c4e208f82177a7b9ac3","id":6},{"snippet":"means any type of software that is surreptitiously installed on a computer and,","snippetLinks":[{"key":"type-of","type":"definition","offset":[10,17]},{"key":"software","type":"clause","offset":[18,26]},{"key":"installed","type":"clause","offset":[51,60]},{"key":"computer","type":"clause","offset":[66,74]}],"size":2,"samples":[{"uri":"https://www.ftc.gov/sites/default/files/documents/cases/2009/06/090615pricewertorder.pdf","label":"www.ftc.gov","score":6},{"uri":"https://www.robbevans.com/assets/case-files/pricewertorder01.pdf","label":"www.robbevans.com","score":6}],"hash":"0d5dd3de344f5a40e8a4b8b06b91e422","id":7},{"snippet":"has the meaning set forth in Section 6.18.7.","snippetLinks":[{"key":"meaning","type":"clause","offset":[8,15]},{"key":"set-forth","type":"definition","offset":[16,25]},{"key":"section","type":"clause","offset":[29,36]}],"size":2,"samples":[{"uri":"https://ir.digitalturbine.com/quarterly-reports/content/0001193125-12-475539/d425218dex101.htm","label":"Purchase Agreement","score":21},{"uri":"/contracts/6LuBJfUMSMI#spyware","label":"Purchase Agreement (Mandalay Digital Group, Inc.)","score":21}],"hash":"f43505747afcc25277326f04a64f08f9","id":8},{"snippet":"means different things to different people. What one person views as harmful software another person may view as helpful. Although many extreme types of spyware may be universally viewed as “bad software” in the eyes of the computer user (i.e. software that secretly installs itself onto a computer to steal personal information to be used for identity theft), other types of software may be viewed as desirable by some individuals and not desirable by others. For example, SideStep is a program that informs a user who has purchased a plane ticket whether better deals on the same trip are available with other airlines. However, potentially useful programs such as SideStep track what users see and what users' preferences are. These programs also have extensive information about users' offline activities.65 While some users might view this as intrusive software and wish to prevent it from installing itself onto their computers, others would welcome its installation. Thus, spyware legislation that is anchored in notice and consent requirements will allow users to define for themselves what constitutes unwelcome spyware.","snippetLinks":[{"key":"different","type":"definition","offset":[6,15]},{"key":"things","type":"definition","offset":[16,22]},{"key":"people","type":"clause","offset":[36,42]},{"key":"views","type":"clause","offset":[60,65]},{"key":"harmful-software","type":"clause","offset":[69,85]},{"key":"another-person","type":"clause","offset":[86,100]},{"key":"helpful","type":"definition","offset":[113,120]},{"key":"extreme","type":"clause","offset":[136,143]},{"key":"types-of","type":"clause","offset":[144,152]},{"key":"bad","type":"definition","offset":[191,194]},{"key":"installs","type":"definition","offset":[267,275]},{"key":"steal","type":"definition","offset":[302,307]},{"key":"personal-information","type":"clause","offset":[308,328]},{"key":"identity-theft","type":"clause","offset":[344,358]},{"key":"desirable","type":"clause","offset":[402,411]},{"key":"individuals","type":"clause","offset":[420,431]},{"key":"for-example","type":"clause","offset":[461,472]},{"key":"purchased","type":"definition","offset":[524,533]},{"key":"plane","type":"definition","offset":[536,541]},{"key":"ticket","type":"clause","offset":[542,548]},{"key":"better","type":"clause","offset":[557,563]},{"key":"deals","type":"clause","offset":[564,569]},{"key":"trip","type":"clause","offset":[582,586]},{"key":"available","type":"clause","offset":[591,600]},{"key":"other-airlines","type":"definition","offset":[606,620]},{"key":"potentially","type":"clause","offset":[631,642]},{"key":"useful","type":"definition","offset":[643,649]},{"key":"programs","type":"clause","offset":[650,658]},{"key":"track","type":"clause","offset":[676,681]},{"key":"users","type":"clause","offset":[687,692]},{"key":"preferences","type":"clause","offset":[713,724]},{"key":"extensive","type":"definition","offset":[755,764]},{"key":"offline","type":"clause","offset":[790,797]},{"key":"to-prevent","type":"definition","offset":[876,886]},{"key":"installing","type":"clause","offset":[895,905]},{"key":"computers","type":"clause","offset":[924,933]},{"key":"installation","type":"clause","offset":[960,972]},{"key":"legislation","type":"clause","offset":[988,999]},{"key":"anchored","type":"definition","offset":[1008,1016]},{"key":"notice-and-consent-requirements","type":"definition","offset":[1020,1051]},{"key":"allow","type":"clause","offset":[1057,1062]},{"key":"unwelcome","type":"definition","offset":[1111,1120]}],"size":2,"samples":[{"uri":"https://core.ac.uk/download/pdf/232774367.pdf","label":"Notice","score":10},{"uri":"https://jolt.richmond.edu/jolt-archive/v13i1/article1.pdf","label":"Notice","score":10}],"hash":"941008f95d842b71d9097550afb3604d","id":9},{"snippet":"means computer programs or tools that: (i) alter a computer User's browser or other settings or use an ActiveX control or similar device to download ad supporting software without providing fair notice to and obtaining affirmative consent from the User; (ii) prevent a computer User's reasonable efforts to block the installation of or disable or remove unwanted software; (iii) remove or disable any security, anti-Spyware or anti-virus technology on a User's computer; (iv) send email through a User's computer without prior authorization; (v) open multiple, sequential, stand-alone advertisements in the User's Internet browser which cannot be closed without closing the Internet browser or shutting down the computer; or (vi) other similar activities that are prohibited by Applicable Laws.","snippetLinks":[{"key":"computer-programs","type":"clause","offset":[6,23]},{"key":"tools","type":"clause","offset":[27,32]},{"key":"alter","type":"definition","offset":[43,48]},{"key":"settings","type":"clause","offset":[84,92]},{"key":"control","type":"clause","offset":[111,118]},{"key":"device","type":"clause","offset":[130,136]},{"key":"download","type":"clause","offset":[140,148]},{"key":"supporting-software","type":"clause","offset":[152,171]},{"key":"providing","type":"clause","offset":[180,189]},{"key":"fair","type":"clause","offset":[190,194]},{"key":"notice-to","type":"clause","offset":[195,204]},{"key":"obtaining","type":"definition","offset":[209,218]},{"key":"affirmative-consent","type":"definition","offset":[219,238]},{"key":"the-user","type":"clause","offset":[244,252]},{"key":"prevent","type":"clause","offset":[259,266]},{"key":"reasonable-efforts","type":"clause","offset":[285,303]},{"key":"block","type":"clause","offset":[307,312]},{"key":"installation-of","type":"clause","offset":[317,332]},{"key":"disable","type":"definition","offset":[336,343]},{"key":"remove","type":"clause","offset":[347,353]},{"key":"unwanted","type":"definition","offset":[354,362]},{"key":"iii","type":"clause","offset":[374,377]},{"key":"any-security","type":"definition","offset":[397,409]},{"key":"anti","type":"clause","offset":[411,415]},{"key":"virus","type":"clause","offset":[432,437]},{"key":"technology","type":"clause","offset":[438,448]},{"key":"send","type":"clause","offset":[476,480]},{"key":"email","type":"clause","offset":[481,486]},{"key":"prior-authorization","type":"clause","offset":[521,540]},{"key":"open","type":"clause","offset":[546,550]},{"key":"multiple","type":"clause","offset":[551,559]},{"key":"sequential","type":"definition","offset":[561,571]},{"key":"stand","type":"clause","offset":[573,578]},{"key":"advertisements","type":"clause","offset":[585,599]},{"key":"internet-browser","type":"definition","offset":[614,630]},{"key":"closed","type":"clause","offset":[647,653]},{"key":"closing","type":"clause","offset":[662,669]},{"key":"the-internet","type":"clause","offset":[670,682]},{"key":"other-similar-activities","type":"definition","offset":[730,754]},{"key":"prohibited","type":"clause","offset":[764,774]},{"key":"applicable-laws","type":"clause","offset":[778,793]}],"size":2,"samples":[{"uri":"https://www.appclients.mobi/legal/Publisher_Network_Agreement.pdf","label":"Publisher Network Agreement","score":21},{"uri":"http://717ads.com/legal/Publisher_Network_Agreement.pdf","label":"Publisher Network Agreement","score":19}],"hash":"63bd797328a45ff1defe4ac115759215","id":10}],"nextCurs":"ClQSTmoVc35sYXdpbnNpZGVyY29udHJhY3RzcjALEhpEZWZpbml0aW9uU25pcHBldEdyb3VwX3YzNiIQc3B5d2FyZSMwMDAwMDAwYQyiAQJlbhgAIAA="}} id=pagination-first-page>