{"id":5490,"date":"2005-10-31T11:54:16","date_gmt":"2005-10-31T10:54:16","guid":{"rendered":"https:\/\/destinationcyber.com\/?p=5490"},"modified":"2005-10-31T11:54:16","modified_gmt":"2005-10-31T10:54:16","slug":"classifier-les-spywares-selon-leurs-dangerosites-pour-mieux-les-bloquer","status":"publish","type":"post","link":"https:\/\/destinationcyber.com\/?p=5490","title":{"rendered":"Classifier Les spywares selon leurs dangerosit\u00e9s, pour mieux les bloquer"},"content":{"rendered":"<p>Afin d&rsquo;am\u00e9liorer la lutte contre les logiciels publicitaires et espions, l&rsquo;organisation internationale Anti-spyware Coalition (ASC), cr\u00e9\u00e9e d\u00e9but juin, vient de publier la version d\u00e9finitive des d\u00e9finitions qu&rsquo;elle a formul\u00e9es pour ces logiciels intrusifs.<\/p>\n<p>Celles-ci s&rsquo;appuient dans leur vaste majorit\u00e9 sur les concepts qu&rsquo;elle a pr\u00e9sent\u00e9 en juillet dernier, et sur les quelque 400 commentaires qu&rsquo;ils ont suscit\u00e9.<\/p>\n<p>Pour l&rsquo;ASC, un logiciel devient intrusif s&rsquo;il est install\u00e9 sans que l&rsquo;utilisateur n&rsquo;ait pu donner son consentement en toute connaissance de cause.<\/p>\n<p>Les plus virulentes \u00e9manent des \u00e9diteurs de logiciels anti-spyware qui craignent que la publication de ces d\u00e9finitions aident les cr\u00e9ateurs de programmes malveillants \u00e0 contourner leurs produits.<\/p>\n<p>fanch<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Afin d&rsquo;am\u00e9liorer la lutte contre les logiciels publicitaires et espions, l&rsquo;organisation internationale Anti-spyware Coalition (ASC), cr\u00e9\u00e9e d\u00e9but juin, vient de publier la version d\u00e9finitive des d\u00e9finitions qu&rsquo;elle a formul\u00e9es pour ces logiciels intrusifs. Celles-ci s&rsquo;appuient dans leur vaste majorit\u00e9 sur les concepts qu&rsquo;elle a pr\u00e9sent\u00e9 en juillet dernier, et sur les quelque 400 commentaires qu&rsquo;ils [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_citadela_custom_class":"","footnotes":""},"categories":[15],"tags":[],"class_list":["post-5490","post","type-post","status-publish","format-standard","hentry","category-securite"],"_links":{"self":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/5490","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5490"}],"version-history":[{"count":0,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/5490\/revisions"}],"wp:attachment":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5490"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5490"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5490"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}