|
|
Criteria for detection for the MVPS HOSTS
File
The following criteria is part but not limited to what determines whether a program
and or a website domain(s) is added for inclusion in the Windows
HOSTS file.
Distribution and
Installation
- Installs without user permission, user interaction or an
installation interface
- Bundles other known/unknown adware, spyware, or malicious software
including potentially unwanted software
- Installs hidden plug-ins in the Web browser that do not have
a user interface
- Is installed by an ActiveX control or Exploits a security vulnerability in any way
- Installs using deceptive or questionable methods or tactics
- Installs even if the user clicks No or cancels the
installation
- Is installed by third-party affiliates
- Offers an affiliate program that pays a fee for distributing
potentially unwanted software
- Is affiliated with malicious or questionable portals, search
engines, or hacking sites
Behavioral
Criteria
- Modifies the HOSTS file without full disclosure in an
acceptable and enforceable EULA
- Modifies or replaces the HOSTS file without creating a valid
backup
- Modifies registry setting related to the HOSTS file
- Changes common settings, such as the home page or search
page, without user permission
- Changes any Web browser configuration which the user can not
undo
- Uninstalls existing software without user consent
- Includes a process that cannot be manually terminated by the
user
- Displays pop-up or pop-under windows outside of the
application
- Displays pop-up or pop-under advertisements that cannot be
closed by clicking a Close button
- Modifies Web site content, such as changing search results
or substituting certain advertisements for other advertisements
- Displays pop-up advertisements when the Web browser is not
running
- Displays pop-ups or 3rd party banners or images
- Automatically restarts itself if the user terminates its
process
- Restores registry keys or file entries that are removed by
the user
- Redirects or blocks searches, queries, user-entered URLs,
and other sites without notification or user consent
Security Criteria
- Changes operating system security settings without user
permission
- Changes software security settings, such as a Web browser
security settings, without user
permission
- Silently adds entries to the browsers web content zones
(Trusted, Restricted Zone, etc.)
- Silently adds entries to the users Firewall to bypass
detection
- Connects to the Internet without user permission
- Disables firewalls, Antivirus software, or Anti-spyware
software or other Security related programs
- Opens a port on the computer without user knowledge
- Silently reinstalls or updates components
- Adds a new dial-up connection or other network connection
- Initiates a connection to the Internet or initiates a
dial-up connection without user interaction
- Prevents Anti-spyware or Antivirus software from removing
the program
- Downloads and installs software or updates without user permission
- Runs in a mode that hides processes from the user or system
tools
- Provides remote administration or file transfer capabilities
- Monitors sensitive items without explicit notice and
consent, such as keystrokes, emails, instant messages
screenshots, or the history or open programs and documents
- Runs malicious or questionable scripts
Privacy Criteria
- Does not contain a Privacy policy, or uses a 3rd party
privacy policy which fails to provide an easily accessible
privacy policy that explains data collection and other practices
used by the program or site.
- Does not contain or display an acceptable and enforceable EULA (End User License Agreement)
- Installs a LSP (layered service provider) without full
disclosure and explicit user permission
- Silently tracks sites visited without user permission, such
as by IP address, GUID, email
address, name or other identifier such as 3rd party hit
counters,
web beacons, and or
uses non-session third-party Cookies.
- Tracks Web browsing behavior and transmits this information
to a remote server
- Tracks online activity and matches it to personally
identifiable information without clear notice
and consent, including but not limited to Web pages viewed or
accessed, user selected content, keywords and search terms
- Tracks Web browsing behavior via 3rd party Cookies (aka:
Data Miners) or requires the user to access another site for the
purpose of using an "opt-out" Cookie
- 3rd party surveys that may or may not be part of third-party advertising,
marketing, or metrics/measurement networks without full
disclosure of information obtained or where this information is
retained and with whom specifically this information is shared
- Collects personally identifiable information without express
consent in statements other than the EULA or privacy policy
Removal
- Does not include a working uninstaller that is compatible
with "Add or Remove" or "Programs and Features"
- Automatically reinstalls itself after the user uninstalls it
or part of it
- Requires the user to download an uninstaller from a Web site
- Requires Internet access to uninstall
- Requires additional information to uninstall the software,
such as email address
- Uninstalling the software causes the system to become
unstable or vulnerable
Other
- A software program or website including any other Web sites
or domains owned, maintained or affiliated with, that are
detected by an but not limited to any Antivirus or Anti-Spyware type program or
mentioned in their Database
- Any Web site that is determined to be in a Blacklist Status
in a Domain whois lookup
- Any site that uses bogus, misleading or non-existent
information in the Domain Registration
- Advertisers or other 3rd party providers that run their content on sites that are known
to install/distribute malicious software including
potentially
unwanted software
- Any site that is involved in
Spamdexing (search engine spamming) or intentional
redirection links
- Web sites or domains owned, maintained or affiliated with,
that are determined to be involved in
Phishing or other undesirable conduct
Additional
Resources for Criteria for Detection
To contribute a listing for our
resources, or any other comments:
Contact
Reproduction
of information on this site, in any form, is prohibited without express
written permission.
Microsoft and or MVPS.org are in no way affiliated with, nor offers endorsement of, this
site.
Copyright © 1998 - 2021 All rights reserved.
This work is licensed under a
Creative Commons License.
https://winhelp2002.mvps.org/criteria.htm
|