TAI Categories

At Lavasoft, we know that different types of spyware and malware present different types of threats. That is why, when you complete a scan with Ad-Aware, each threat is classified under one of the following categories. The comprehensive categories allow you to easily and quickly identify the types of threats that are on your computer. Click on the categories below to learn more.

Adware
Adware is a generally harmless application that displays unexpected or unwanted advertising on your computer. It usually enters your system through freeware bundles or as additional/required content with shareware. You may choose to remove adware in order to stop unwanted advertising, but some programs are required in order to use a host application. Adware that may have tracking features/capabilities are in a more descriptive category (like Trackware or Data Miner) in order to give you more detailed information.
Annoyware
Annoyware is a type of adware that is frequently intrusive and disruptive. It causes an excessive number of popups/popunders, even when you are not connected to the Internet. Annoyware can also cause noticeable system and/or bandwidth slowdowns.
Data miner
Data miners are designed to actively collect information about you. Data miners can transmit your information to a remote server owned by the application's producer (This may be disclosed to you through a privacy policy/licensing).
Dialer
Dialers are designed to change your DUN (Dial Up Networking) settings in order to connect to your phone line in stealth mode, and/or dial expensive connections without your authorization.
Exploit
Exploit threats employ the use of software or a system exploit to install/operate.
Hijacker
Hijackers are designed to hijack your home page, Hosts file, browser favorites, default search engine, and/or system settings.
Keylogger
Keyloggers are designed to record and/or transmit keystroke information.
Malware
Malware is malicious software that is designed to harm your system.
Misc
This category is for noteworthy threats that do not fall under a specific detection category.
Monitoring Tool
Monitoring tools include Remote Access Trojans (RATs), Root Kits, etc.
MRU
These harmless records of the Most Recently Used (MRU) lists (like recent documents) are stored in your registry, but are included as a category by customer request. Some anti-spyware applications list MRU as being potentially harmful, so it appears their scan detected more content.
Spyware
Spyware is software designed to secretively collect information. It may install in stealth mode to gather information and transmit it to second and third parties without your knowledge and consent.
Trackware
Trackware is similar to Data Miners, but is passive in nature. It includes tracking cookies as well as applications that collect anonymous (not personally identifiable) information, like GUID’s or sites visited.
Virus
A virus is a self-replicating program that injects itself into other programs. It can harm your system by damaging files, folders, directory structures, and erasing your hard drive. The best protection for your computer is a 3-tiered approach: anti-spyware software, anti-virus software.
Vulnerability
These threats use system and/or security vulnerabilities to install and operate on your system.
Worm
A worm is a self-replicating virus and/or Trojan, designed to spread across many systems and networks. The best protection for your computer is a 3-tiered approach: anti-spyware software, anti-virus software