Storage News
Security News
Networking News 
FREE NEWSLETTERS
search
 

internet.commerce
Be a Commerce Partner
Web Hosting Providers
2nd Mortgage
Promotional Products
GPS
Online Universities
Greeting Cards
Register Domain Name
Prepaid Phone Card
Mortgage Refinance
Promotional Items
Education Degrees
Economy Server Racks
Health Insurance
Condos For Sale

internet.com
Developer
International
Internet Lists
Internet News
Internet Resources
IT
Linux/Open Source
Personal Technology
Small Business
Windows Technology
xSP Resources
Search internet.com
Advertise
Corporate Info
Newsletters
Tech Jobs
E-mail Offers


Whitepaper: Building an Intelligent Infrastructure for SAP
Many enterprises today are faced with explosive data and application growth. These firms are searching for the best architecture to manage data and resources, "do more with less," and enable their SAP implementation to run most effectively. This paper provides an overview of how implementing SAP on HP Integrity server solutions can help enterprise firms reduce IT costs and enhance ROI, regardless of operating system or database releases. >>
 
Whitepaper: The Three Rs—Reliability, Resiliency, and Repairability—of Single-System Availability
Traditionally, the terms reliability, availability, and serviceability, or RAS for short, have been used to describe uptime characteristics of server hardware. However, a new set of terms, the "Three Rs"&3151;reliability, resiliency, and reparability—probably better describe those attributes. Learn more about the Three Rs and how HP's dedication to Three R design principles delivers real benefits to customers. >>
 
Whitepaper: The Practical Side of Server Virtualization
Server virtualization allows IT shops to lower costs, increase flexibility and reduce risk. Read this whitepaper to learn more about the benefits of virtualization and how HP's Virtual Server Environment reduces costs while it improves the flexibility of resources. >>
 
Transforming Your EnterpriseSynchronizing Business and IT to Capitalize on Change
Change is fundamental to realizing the benefits of the Adaptive Enterprise. Learn how HP helps companies respond to change by building financial flexibility into how they transition, acquire, manage and retire technology. >>

Related Articles
Big Ads Add to Adware, Spyware
Security Products
 Informant (RippleTech, Inc)
 AppRadar (Application Security, Inc)
 SecurSurf (SecurStar GmbH)
 PrivacyPost (Privacy Networks)
 Install-Block (Bash Software)
 dotDefender (Applicure Technologies, Ltd.)

Security features



FREE 30-day trial of WS_FTP Server! Powerful security. Granular file access control. Event driven automation. Best-in-class performance. HIPAA & SOX compliant. No special training required!

Going Mano a Mano with Spyware
April 7, 2006

Thank goodness for antispyware software. It detects a wide range of nasty and intrusive code. Better yet, it unceremoniously relegates that code to a tidy digital death.

stock photography
Plagued by spyware? You may be tempted to undergo a complete wipe. But not so fast...
But for all of its charms, most antispyware apps have a glaring, though understandable, fault - they can't detect every piece of spyware out there. Regardless of whether it's a paid product or a free download, 100 percent detection remains elusive.

That's the problem of casting such a wide net. There's bound to be a hole somewhere.

Advanced users typically avoid getting stung by keeping a couple of programs handy in the hopes that one will pick up what the other misses. But good luck getting the typical Windows user to run a scan every once in a while, never mind two.

Sadly, even this practice won't catch some of the more elusive bugs out there, which have been termed "rogues" for the purposes of this week's discussion.

Even so, you aren't completely defenseless. There are plenty of tools that can help admins find and remove even the most stubborn of these rogues. Be forewarned, the process may involve downloading some extra utilities, burning a live CD, a healthy dose of Googling and a reboot or two.

Which might lead one to wonder, why go through all that trouble? Starting fresh and recovering from backups may seem tempting, but it's not practical for many users, especially if they have an untold number of apps installed. Who wants to spend hours reinstalling them and restoring all of those custom settings and add-ons?

Plus, who knows how long spyware inhabited the system? Can the backups and restore points be trusted? (Hint: Probably not, and if you found rogue spyware on the system, it's a good bet it picked up something worse along the way.)

This week we examine the methods used by some of the experts at AO. It should come in handy when a user encounters some baffling PC behavior.


Note: Any opinions expressed below are solely those of the individual posters on the AntiOnline forums.

Spotlight Thread:
Manually removing spyware

Thread starter brokencrow offers some good tips.

Search the system for any recently added dll's or exe's. Also, for any null files (xxx.~) or tmp's. The time stamp's important. One of the first things to determine is how long a user's been having problems. This will help refine your search for any recently added files.

Do your homework here. Google any dll's or exe's you find in your search-by-date. No sense in deleting any legitimate app files. Sometimes you'll find dll's and exe's in odd places: temp folders, even the Windows' font folder. Use common sense. If you're not sure, backup the dll or exe to a USB drive. Null files and tmp files are safe to add to your list. Crap Cleaner (CCleaner) will clear the stuff in the temp folders generally but not always. Don't take anything for granted.

Windows isn't always cooperative when it comes to detecting and deleting the furtive types. Time for some drastic measures.

Removing our little friends is a process of booting and rebooting till they're gone. You need a live Linux CD. First, so we can see what's on the Windows' partition. And second, so we have another option for removing the rogues (they can get tricky). You can hide from Windows' API, but you can't hide from Midnight Commander.

Relyt simplifies the process like this:

I love the command line approach, however you can eliminate much of your search by employing some sort of "Change Control" even on your home network.

There are multitudes of Integrity Monitors online. Just pop "Integrity Monitor" into your favorite search engine and select one that best fits your needs. For brevity I only listed two. - Click here to see what they are.

How do you zero in and eradicate on spyware? Discuss it here.


Security Features Archives

Whitepaper: The Three Rs--Reliability, Resiliency, and Repairability--of Single-System Availability
WEBCAST: The Role of Security in IT Service Management. Get invaluable insight. Sign up now!
WEBCAST: Using End-User Based IT Management to Monitor Infrastructure & Apps. Nov. 30th Sign up now.
Windows Genuine Software: Counterfeit software puts you at risk. Make sure your software is genuine.
Join IT Research Panel and Get Paid: Influence the direction of IT research by taking brief online surveys. Join now!


JupiterWeb networks:

internet.comearthweb.comDevx.comGraphics.com

Search JupiterWeb:

Jupitermedia Corporation has two divisions: Jupiterimages and JupiterWeb

Jupitermedia Corporate Info


Legal Notices, Licensing, Reprints, & Permissions, Privacy Policy.

Web Hosting | Newsletters | Tech Jobs | Shopping | E-mail Offers