What are examples of unwanted technologies that fail to obtain my consent?
• Root kits are a type of system modification technology that fail to obtain your consent. Intruders use this program after cracking a computer system to help them hack into a system and gain administrative-level access. Once a program gains access, intruders can monitor traffic and keystrokes; alter log files; attack other machines on the network; and alter existing system tools to circumvent detection. • Zombies are a type of remote control technology. This occurs when intruders use your computer without your consent to send spam or attack remote servers with a large amount of traffic. • Screen scrapers are a type of tracking technology that record images of activity on your monitor without consent. • Hijackers are a type of system modifying technology. This occurs when you visit a webpage and your homepage or default search engine immediately changes without your consent. • When you visit a webpage and new software, such as a new toolbar, is added to your computer without your conse