Showing posts with label Spyware. Show all posts
Showing posts with label Spyware. Show all posts

Wednesday, December 13, 2006

Remove Rogue Desktop Icons Created By Spyware.

If you have used a Windows machine for a while, whether it's Windows XP, Windows 2000, or Windows 98, you're sure to have noticed desktop icons appearing from out of nowhere. How can icons mysteriously emerge on your Windows desktop?

1. When you buy a computer, many vendors place icons to selected products and services on your desktop, such as links to high-speed Internet Service Providers (ISPs) or add-on services vendors think you may need.

2. As you install software on your Windows machine, icons may appear, either to start the application or link to the manufacturer's website. Installing just one program could add three or more icons to your desktop!

3. It's easy to accidentally drag a Favorite, bookmark, text file, or other icon to your desktop, creating an icon.

Normally, it's easy to delete Windows desktop icons. Just place your mouse pointer on the offending icon, then right-click it and choose "Delete", clicking "Yes" to confirm if prompted.

However, what if the rogue icons are for adult websites, unfamiliar search engines, or other websites you don't recall visiting? You may try removing these icons but get an error, or after removal they still reappear again and again and again!

If so, then more than likely spyware, adware, or other malware has infected your machine. It may have been through file trading software, an inadvertent "yes" click when a popup window asked you to install software, 'freeware' that included adware, or other means. To remove the rogue icons, you need to remove the malware creating these icons.

Removing spyware and adware can be a time-consuming process, fraught with potential disaster as it is possible to accidentally remove files that render your operating system unusable. However, the following software products can help with this process as long as you read the instructions carefully, make backups, and get expert advice if you're not completely sure about removing what they ask you to do:

* Ad-Aware: http://www.lavasoft.com/

* Microsoft Windows AntiSpyware: http://www.microsoft.com/athome/security/spyware/software/

* Pest Patrol: http://www.pestpatrol.com/

* Spybot Search and Destroy: http://safer-networking.org/

* Spy Sweeper: http://www.webroot.com/

So, how can you prevent these icons from appearing in the first place? Practice safe computing.

* Backup your machine. If it does get infected to the point of being unusable, at least you won't lose all your important files.

* Install security-related operating system updates so spyware and adware cannot enter your system through well-known exploits.

* Download or buy a virus scanner, and keep it updated! Virus scanners cannot detect all spyware, but it doesn't hurt to have one. Check online or visit your local computer software store.

* Purchase a hardware or software firewall, and keep it updated! Firewalls help protect your computer from common exploits that spyware or adware can use to infect your machine.

* Consider using a different web browser. Though it is not perfect, Mozilla Firefox is currently less susceptible to spyware than Internet Explorer, mainly because it lacks certain technology (such as ActiveX) that is often exploited by malware writers. Note that depending on your web use, certain websites may not work correctly with other web browsers.

By practicing safe computing and using spyware-removal software, you can help remove rogue desktop icons from your desktop and keep others from appearing.

Andrew Malek is the owner of the MalekTips computer and technology help site. Visit his anti-spyware page for more advice on removing adware, spyware, and other malware.

Free Spyware Removal.It's Not As Easy As It Sounds.

Nobody wants to pay to remove spyware. At the very least, I don't. The blasted stuff shouldn't be on my computer anyway, so what ever would make me want to shell out cash to get rid of something that I shouldn't have in the first place?

Spyware removal tools come in many different forms, and from many different places. Lavasoft's Ad-Aware is from Sweden, and Spybot: Search and Destroy is from Germany, I think. (Their error messages come up in German, so I have to assume..)

Purchasing adware removal software can even be dangerous, so to speak. If you're buying it from a pop-up then more than likely you're just lining the pockets of the person that infected your machine in the first place. I've had many infested machines have icons for spyware removers magically appear on the desktop. Of course, if you want to actually clean anything, you have to shell out some dough.

If you're going to go it alone, for free, then there are a few tools you'll need. The first is Ad-Aware, as mentioned above. Spybot: S&D is a second excellent choice. The third, and much more advanced (and therefore difficult to use) spyware remover is HijackThis. Almost all scanners will miss various adware items, simply because there is so much produced nowadays so quickly. It's impossible to keep up.

Once you have the aforementioned software downloaded, installed, and updated then you're going to want to boot to safe mode. Why not scan now immediately? Cause the adware is still running. You can't delete a file that's in use. That said, safe mode is less effective than it used to be, but it still may work.

To get to safe mode: Reboot the machine, press F8 repeatedly once it restarts until a menu comes up that has "safe mode" listed. Select it, and press enter. Windows will load nothing but the essentials.

As soon as safe mode is loaded then go ahead and do a full system scan with Ad-Aware and Spybot or whatever you happen to have. Following that, reboot and see how your computer runs. If it still has issues, then HijackThis will be neccesary. In order to use this tool, you'll need to have a pretty good grasp on what should and shouldn't be loading in startup, as well as a grasp of what Browser Help Objects you need. (Technically, none, but some software you have installed may use them)

You can get HijackThis help, but if it eludes you then you really should have an experienced user have at it.

Kevin Souter is a full time computer repair technician, and runs sites in his spare time dispensing his knowledge on free spyware removal and computer repair.

Wednesday, December 06, 2006

What to Look for before You Purchase Spyware Software.

Huge number of spyware software applications are available in the market, some being offered as shareware while rest as freeware. (Shareware means a software available for download / CD, and can be used for a particular length of time, usually 30 days. Some are disabled as well). Before making a decision to purchase any such software we should check the reliability and should consider various attributes possessed by them and then select the best and the most appropriate one. The various attributes that one should consider to be the most important when purchasing spyware detection and removal software are -

The spyware software should include tools to enhance the ease of spyware detection and removal. The software should be able to offer descriptions of detected spyware so we can determine whether or not to keep each item. The software should also have auto-update and auto-scheduling capabilities. Auto-update facility ensures that we never forget to download latest spyware definition file. Auto-scheduling ensures that the system is scanned for these malicious codes at a defined interval. This means that even is the system user has changed, the computer is still safe from these spywares. There should be "undo" capabilities in case we accidentally delete something we actually need, and many other features as per individual requirements. The product should provide real-time protection from spyware. In other words, the software should help us prevent spyware installation instead of just removing it afterward. The product should be effective at finding and removing the many different types of spyware.

The product should be easy to use. Its features should be user friendly avoiding any technical jargon, not so easily understood by an average computer user. The user interface should be pleasing to look at, and more importantly, should offer the ease of navigation. The product should be easy to download and install, it should be comfortable enough for running and us to get it up without consulting a book or a tech support person.

There should be a help section installed with the product and should offer easy to understand answers to our questions. There should be someone we can call for support, and the support staff should respond quickly to our email questions. With the right solution for removing and detecting spyware in place, you can keep your computer privacy protected and PC ad-free.

Few top most Spyware software are- Spyware Eliminator, Spyware Doctor, Spy Sweeper, CounterSpy, MS AntiSpyware, Ad-Aware, McAfee, Pest Patrol, NoAdware, Spybot S&D. Best Personal Firewalls are- ZoneAlarm, Outpost Pro, Sygate Firewall, Norton Firewall, Norman Firewall, SurfSecret, Windows Firewall, BlackIce, Injoy, McAfee Firewall.

Computer security awareness is certainly on the improve however it is still amazing how many computer users leave themselves wide open to malicious attacks. Get more free info at: http://www.nichearticles.com/spyware/

Wednesday, November 29, 2006

What Can Be Done About Spyware And Adware.

Having a good Spyware eliminator on your computer is vital now a days with all of the different Spyware, Adware, and other malicious computer parasites that are out there. Most of them are reasonably priced and very easy to use.

Two of the biggest things that these Anti-Spyware programs accomplish for you are that they help in protecting your online privacy and they help make your computer run a lot better. You may wonder about what I'm talking about. Well as far as your privacy goes, companies put this Spyware on your computer through you downloading different things from the Internet. By doing this they are able to track your surfing habits and even get your e-mail address so that they can send you a lot of junk e-mail such as different advertisements. As far as helping your computer run better, you eliminate a lot of these programs from your computer, which are constantly running in the background and eating up a lot of your system resources.

You will see a difference with your computer and you'll also feel a lot more secure with a good Spyware eliminator.

About spyware removers

Spyware removers are a dime a dozen on the Internet. Everyone seems to claim they have the best one. With all of the competition going on with these programs, it may not be an easy choice for you to choose one.

That's why I would like to recommend to you a Anti-Spyware program called NoAdware. First of all, the reason why I recommend this product is because I personally use it and it works. Second of all, it's the most downloaded and used Anti-Spyware program from the Clickbank digital download network.

The program is absolutely simple to use. Just download the program to your computer, install it, and let it do its thing. It will search your computers hard drive and find any Spyware, Adware, and other computer parasites you may have. It is simple to use and very easy to understand.

Robert Dorrance:

Your guide to understanding Spyware, Adware, and other malicious computer parasites. Find out more at http://www.destroy-adware.com

Friday, November 24, 2006

3 Simple Steps to Stay Safe from Spyware.

There are several basic concepts to keep in mind when deciding to stay spyware free for good. This article will outline a spyware checklist for you to keep in mind when getting tough on spyware and taking back control of your computer using two popular free applications, Ad-Aware,and Spybot - S&D. Using these two programs in conjunction will eliminate a vast majority of spyware problems from your computer. For the purposes of this article, "spyware" refers also to adware, malware, and other not-so-nice "features" of today's computing reality.

These are some tell-tale warning signs that your computer may be suffering from spyware-

  • You receive many pop-ups
  • Your computer is running slowly
  • You may have invasive toolbars hijacking your browser
  • Your home page may have been hijacked

Your first step to escaping spyware's wrath is to download and run Ad-Aware and Spybot - S&D, the two leading spyware fighting tools out there, boasting millions of downloads each. Please remember it's always safest to backup your system before installing a new program or executing one. After downloading the two programs, be sure to run the update feature to be sure they are current when it comes to detecting the latest threats. Remove the detected spyware using these two programs, then move to step two.

The second step in staying spyware free involves you to be proactive. At this point your computer should be free from spyware. What you want to do now is keep it this way, to do that there are helpful tips to guide you. In Windows 98 you can use msconfig to view the startup programs on your computer. This is helpful because you can control what programs automatically load when you boot your computer. To access this invaluable tool, go to START >> RUN, type MSCONFIG. If you check the startup programs occasionally you may see a new spyware entry that will alert you it's time to clean out the spyware again.

The third step involves your web browsing habits. It means you must never click on an activex screen that asks you if you want to allow an innocuous looking toolbar, or "surfing aid"be installed. By clicking "allow" you are effectively giving these perfidious spyware authors free reign over your system and personal information. If possible you should surf with the security settings on "maximum" for safest surfing.

In summary, it's important to avoid spyware for your computer and personal identity health. To do so, use free tools available to you and be mindful of your computer settings and surf the Internet responsibly. Following these easy steps will ensure a safe and spyware free existence for you and your computer!

Written by Erich Bihlman, of Bihlman Consulting - PC and Internet Tutoring and Website Design in Prescott, Arizona. Bihlman.com. For additional helpful articles visit IQZone

Saturday, November 18, 2006

Spy Sweeper New version 5.2

What ' s new in 5.2

Spy Sweeper 5.2 stops spyware in its tracks while offering home computer users the ability to configure the program to suit their specific needs, such as:

Choose a Quick, Full or Custom Sweep:
With Spy Sweeper 5.2, you can easily choose to perform a quick, full or customized sweep. If you're looking for an immediate diagnosis, choose a quick sweep. For a pinpointed search, customize your sweep to have Spy Sweeper skip files by folder or file extension. For a deep cleaning, opt for a full sweep.

Exclude Files from a Sweep:
Spy Sweeper allows you to save time during a sweep by skipping specific files or different sections of your PC. You can select specific file extension, such as .xls or .mpg to exclude.

Additional Highlights

As soon as it's installed, Spy Sweeper gives 360 degrees of protection against spyware, including:

Simple Sweeps:
Detecting spyware and removing unwanted programs found on your computer in three effortless steps

Easy Management:
Quickly and simply configure program, sweep and upgrade options

Fast Home:
Use the home screen to access the most commonly used functions of Spy Sweeper

Shields Summary:
A redesigned shields summary page makes it simple to see at a glance which shields are on or off

Action Alerts:
Receive clear, easy-to-understand notifications when new spyware threats are detected

Even Easier to Use

We performed extensive user interaction testing and refined the Spy Sweeper interface to make it even easier for users of all technical abilities to stay protected. Advanced users continue to have the power to configure the program to suit their unique needs, while new users can breeze through the straightforward setup and menus. The new interface sets the standard in ease-of-use and efficiency for spyware removal programs.

Commanding Spyware Detection and Removal

Spyware programs are known to mutate quickly. Spy Sweeper uses adaptive definition technology for detecting spyware mutations that haven't yet received a defense definition. This is yet another benefit of having the world's best spyware research team on your side.

More Powerful Blocking Defenses

Enhanced Smart Shields prevent highly developed spyware programs from ever installing on your PC. You'll receive valuable action alerts to any changes in your computer's core functions, including startup, memory and Internet security settings.

Enhanced Rootkit Discovery Methods

Malicious spyware uses rootkit technology to bury its files deep within your PC. Spy Sweeper finds and destroys these programs with robust rootkit discovery methods, a feature many other anti-spyware programs lack.

Saturday, October 28, 2006

Anti-Spyware Protection: Behind How-To Tips.

There is no doubt that "how-to articles" have become a separate genre. One can find such an article about almost anything; there are even some entitled "How to Write a How-To Article". And, of course, the Web is swarming with the ones like "10 Steps to Protect Your PC from Spyware"(if not 10, any number will do; odd ones like 5,7,9 are most popular) or "How to Forget About Spyware For Good". Please don't accuse me of being sarcastic -- I am not; all these articles by all means are informative and so very useful. They all include really handy tips to protect you from this recently emerged plague called spyware. But?

A typical how-to article is short and snappy, with all unnecessary particulars carefully avoided. An ideal one is a clear scheme of what to do and how (because it is a how-to article). Some essential facts will surely be omitted just for the sake of brevity. Let's look into the author's "trash bin" for info ruthlessly (and maybe baselessly) thrown away.

Hint one: What on earth is spyware?

When you decide to apply "anti-spyware protection", you'd better realize what you want to be protected against. Unfortunately, there is not such thing as complete security. And?

"There is no such thing as spyware in itself"-- you are perplexed, aren't you? I bet you are; what's more, it was Kaspersky who recently expressed this opinion. "The term spyware is basically a marketing gimmick," wrote Kaspersky in the company weblog on March 03, 2005. "Just to separate new ersatz-security products from traditional ones, just to push almost zero-value products to the security market."

This quote (extremely curtailed and out of the context) have already spread all over the Internet, but it is very useful to read the whole posting to see the whole picture, so visit http://www.viruslist.com/en/Weblog?Weblogid=156679222

Few definitions caused so much controversy and confusion as did "spyware". Eugeny Kaspersky blames marketers for having coined this term--and partially he is right. But only partially.

As a professional, he classified various malicious programs according to their structure and characteristics; in this classification there is indeed no place for "spyware", which is too vague term to exactly denote anything with a particular structure.

On the other hand, marketers and journalists needed an expressive, easy-to-remember word to name existing (!) information-stealing programs to tell users (who may be not so versed in software as its developers) how to protect their computers.

What is "spyware" then? Spyware is a commonly used general term for any type of software that gathers personal information about the user without his or her knowledge and transmits it to a destination specified by the author of the program. Spyware applications are frequently bundled in other programs--often freeware or shareware--that can be downloaded from the Internet.

So, the term is very general and doesn't reflect either structure or characteristics of such software. After all, it is only a conventional word for programs that steal information.

According to Kaspersky, programs which are now called spyware, have existed for years. It's true. Who disagrees? Password-stealing Trojans were actually known as far back as in 1996. But it's also true that most dangerous information-stealing programs are on the rise. Spy Audit survey made by ISP Earthlink and Webroot Software (the survey lasted for a whole year 2004) showed--16.48% of all scanned consumer PCs in 2004 had a system-monitor, 16.69% had a Trojan.

Another bitter truth is that some unscrupulous producers now are jumping at the chance of making quick money. There are lots of suspicious, low-performing, or adware-installing products. See, for example, the list at http://www.spywarewarrior.com/rogue_anti-spyware.htm But saying that all the dedicated anti-spyware solutions are like that?To put it mildly, it's a bit too much.

Hint Two: Too Many Promises Made -- Is it Possible to Keep them?

There are loads of software programs nowadays created for fighting spyware. An ordinary consumer tends to get lost in plenty of information and lots of products, which are supposed to help him get rid of spyware. If all the advertising claims were true, it would have been easy. In reality it isn't.

Anti- spyware and anti-viruses work almost the same way. The efficiency of most anti-spyware programs is determined (and restricted, too) by signature bases. The more code clips (i.e. signatures) there are in the base, the more effectively the program works - it means the more spyware programs it can identify. Only programs from the signature base are recognized as spyware; all other spy programs will be running unnoticed and unstopped.

So, absolutely all the signature- basis- containing programs are pretty much the same, whatever their ads say. They all rely on the same "match pattern"; the difference is only how many signatures each of them contains.

What conclusion we can make here? The bigger the signature base, the more reliable the product is, no matter whether it is anti-spyware or an anti-virus. If the software applies signature base, it's better to choose a product from a big company, which can afford spending plenty of money on research and updates.

Another conclusion we can make is that all such software without constant updating pretty quickly becomes useless and even dangerous, because users still expect it to protect their PCs. New spyware is constantly being developed, and anti-spyware developers have to catch up with it all the time. This race started when very first malicious programs appeared, and it is impossible to say whether it will ever end.

Alexandra Gamanenko currently works at Raytown Corporation, LLC--an independent software developing company. Software, developed by this company, does not rely on signature bases. Its innovative technology is capable of disabling the very processes of stealing information,such as keylogging, screenshoting, etc.
Learn more -- visit the company's website: http://www.anti-keyloggers.com

Friday, October 27, 2006

Is Your music player Spy on You?

In today's times spyware is a very serious issue and all computer users should be aware of the possible damage it can cause. It is estimated by well known industry insiders that nearly 90% of all computers are infected with some kind of spyware. This no
surprise as spyware programs can be highly contagious and spread from computer to computer via emails and network exchanges rapidly.

Spyware's main intent is usually to track where you go on the internet. This includes websites you visit, what you buy from the internet, and generally what you use the internet for, all the while the spyware program will report this information back to the publisher. The publishers of spyware are rich with all the information of thousands of computer users surfing habits and they make a huge profit by selling this information to third parties who may not take your privacy concerns in to account.

You may think that running anti-virus programs and firewalls on your computer will be enough to protect you from this threat but think again. Spyware can easily slip past these programs as spyware disguises itself as a part of a program that you actually want to install on your computer. Programs that you use daily may be harvesting spyware.

One of the most popular music players on the internet that millions of people use to play, download and organise their favourite music with is actually spyware. Can you guess what it is? RealPlayer is not just a feature rich jukebox anymore, it's spyware. If you read the agreement before you install the player for the first time, RealPlayer actually tells the unsuspecting user that it will record all the information about what music you listen to, what videos you view and how often. It then transmits this private information back to it's corporate office using your resources while doing so. This information is kept on file and used to profile you. Unfortunately you have no say in what information they have access to.

Spyware detection and removal software is imperative to keeping your private information private and keeping your computer healthy. It's a scary thought that companies are armed with the technology to snoop on you when you are simply enjoying music and watching videos you enjoy in you own home.

Arm yourself with the knowledge you need to stay as protected as you can by visiting Spyware Advice where we provide free unbiased information on the latest spyware threats, how to remove them and how to stay protected.

Security News