Toolbar boots out spies and pests

Yahoo has released a version of its internet-services toolbar that removes spyware and adware.

Yahoo has released a version of its internet-services toolbar that removes spyware and adware.

As users surf the web, such programs download to their machines without their consent or knowledge, tracking their web usage, launching pop-up ads or undertaking other undesirable activities.

When introduced last May, Yahoo's enhanced toolbar was criticised for failing to scan for adware by default - users had to enable the option. The new version default-scans for adware, spyware and other intrusive and stealthy software, such as cookie trackers.

Although many people regard spyware and adware as equally obnoxious, some point out that spyware is more intrusive and potentially dangerous. The Yahoo toolbar defines spyware as programs that track how you use your computer or surf online without your permission and adware as launchers of pop-up and pop-under ads.

After scanning for such programs, the toolbar lists those it finds and suggests which should be removed as potentially malicious and harmful, and which should be further evaluated. The scanning software comes from Pest Patrol.

The enhanced Yahoo toolbar can be downloaded free at toolbar.yahoo.com/. It also contains a search engine box, a button for blocking pop-up ads and shortcuts to a variety of Yahoo internet services such as e-mail, calendar, notepad, games and the Launch online music section of Yahoo's portal.

Juan Carlos Perez writes for IDG

Read more on IT strategy

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close