——————————————————————————–

Programs that network users download and install on their computers — usually without permission from or knowledge of the IT department. While some greynet applications are often useful (for example, instant messaging, streaming media and RSS software, peer-to-peer file sharing, peer-to-peer collaboration and proxy applications), they can also include or malicious programs (such as spyware).